critique discusion below

Anonymous
timer Asked: Mar 3rd, 2019
account_balance_wallet $5

Question Description

Deanna,

It's one thing for government to create and implement a cybersecurity strategy, but it's another thing entirely to put strategy into practice. The most critical step in establishing a successful cybersecurity policy is documenting and distributing the acceptable use conditions for employees. Why? No matter how strong defenses are, users can introduce threats to the organization's networks by falling for phishing scams, posting secure information on social media, or even giving away credentials.

Invasion of privacy is the unjustifiable intrusion into the personal life of another without consent. However, invasion of privacy is not a tort on its own and it will be the responsibility of the government to ensure that all users are aware of the efforts in protecting all user’s privacy information and change the perception of its residents into thinking that the government is intruding and invading their privacy.

It is important to communicate the new cybersecurity policy to its residents, and make sure they understand the relevant details: what they are expected to do, how to do it, and what could happen if they don’t. Remember that things that seem obvious to you—like how to change that password—might not be known to every system user.

Successfully implementing an effective cyber security policy takes time, effort, and participation. However, the alternative is unacceptable in today’s business climate. Gather the right people, develop a security plan, support your team through changes, and provide ongoing training and verification. It won’t happen overnight; take it one step at a time and soon you’ll be well on your way to improving your business data and IT security.

User compliance can be challenging when implementing a new cybersecurity policy. It is very important to communicate with all residents about the new upcoming changes before implementing just to that all users can have some kind of familiarity with the new policy requirements. Also, it will be best to give the users a 90-grace period after implementing in which feedback can be accepted by users and provide a better opportunity in understanding the government’s efforts. This can ensure that there are no change management issues for users and efficient and effective cybersecurity policy implementation roll out.

Tutor Answer

Venic_Expert559
School: University of Maryland

At...

flag Report DMCA
Review

Anonymous
Top quality work from this guy! I'll be back!

Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors