Building and Implementing a Successful Cybersecurity Policy

User Generated

gnlsbba

Computer Science

Description

Building and Implementing a Successful Cybersecurity Policy

Write an essay on the topic, “Building and implementing a successful cybersecurity policy”. The following questions should be titled and covered in the sequences of essay:

  1. What would be a successful cybersecurity policy?
  2. What are the ingredients of a typical cybersecurity policy?
  3. How should the various elements of a cybersecurity policy be articulated?
  4. What considerations should there be in order to successfully implement the policy?
  5. How can you assure the ongoing success of the policy?

Directions:

  • Your paper should be 6-7 pages in length, not including the title or reference pages.
  • Be sure to provide citations from your readings and additional research to support your statements.
  • Your paper must follow Academic writing standards and APA style guidelines, as appropriate.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello, I have uploaded the final copy. Please review the paper, release the funds and leave a good review. Thank you for giving me an opportunity to serve you😍 😍Let me know if you may need any editing.

Running Head: BUILDING AND IMPLEMENTING A SUCCESSFUL CYBERSECURITY
POLICY1

Building and Implementing a Successful Cybersecurity Policy
Name
Institution
Professor
Course
Date

BUILDING AND IMPLEMENTING A SUCCESSFUL CYBERSECURITY POLICY

2

Introduction
Computer security is among the most popular issues in the world today. Unlike in the
past, computer-related crimes are now on the increase. In some cases, computers are the
target of the crime while in other cases, the computers are used in perpetrating the crimes
(Donaldson et al., 2015). However, regardless of the position of the computer when carrying
out such crimes, computer-related crimes lead to enormous damage when they occur. For
instance, computer-related crimes can lead to loss of money, especially when financial
institutions are targeted. In addition, they can lead to massive loss of confidential and critical
personal and organizational information (Atoum, Otoom & Abu Ali, 2014). In other cases,
such crimes lead to an inability to access critical services from an organization, particularly
as a result of DOS attacks. Because of the damage that can result from computer-related
crimes, it is important for an organization to come up with Cybersecurity Policy. The cyber
security policy would outline the assets that an individual or an organization would need to
protect, the cybersecurity threats to those assets and the controls and rules for protecting both
the assets and the organization ((Atoum, Otoom & Abu Ali, 2014). Furthermore, the
cybersecurity policy would inform stakeholder of an organization of their various
responsibilities concerning protecting the information and technology assets of the
organization. Also, such a policy would help to prevent cybercrimes from taking place and
reduce the damage of cybercrimes when they occur. This paper is a critical analysis regarding
building and implementing a successful cybersecurity policy.

What Would Be A Successful Cybersecurity Policy?

It is worth noting that not every cybersecurity policy can help to protect an
organization’s resources from an attack. This implies that an organization can be a victim of
several cybersecurity crimes regardless of having a policy. In such cases, the existing policy

BUILDING AND IMPLEMENTING A SUCCESSFUL CYBERSECURITY POLICY

3

can be regarded as unsuccessful. Therefore, there is a need to carry out extensive research
when designing a cybersecurity policy in order to come up with a policy that can guarantee
security to an organization. In order to ensure that organizations are able to develop
successful cybersecurity policies, different scholars have come up with features that make a
cybersecurity policy successful. According to Harknett & Stever (2011), a cybersecurity
policy should be able to evolve over time. Technology is fast changing, and therefore a
cybersecurity policy should...

Similar Content

Related Tags