Week # 7 Assignment

User Generated

fnuvqn2011

Engineering

Description


Welcome to Week # 7. This week's assignment will help you to fulfill the requirements for the seventh course objective (CO-7: Develop a policy to implement functions that encompass putting programs, processes, or policies into action within an organization). For this week's assignment instructions, please see below:

Assignment Instructions:
You are tasked as the Cyber Security Director at your new organization to develop a policy to implement functions that encompass putting programs, processes, or policies into action within an organization

REQUIREMENTS:

  1. 4 – 6 Pages in length in APA format (not including a cover page and reference section)
  2. Cover Page
  3. Background Section
  4. Analysis of current research on the subject matter
  5. Recommendations
  6. Reference Section

MISCELLANEOUS:

  1. Use current and real world data to make your points, not just the textbook
  2. Your report may focus only on the topic of your choosing - imagine yourself working on one aspect of the report while team members complete the other areas following the same structure.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hi, kindly find attached

Running head: POLICY DEVELOPMENT

1

Policy Development
Student’s Name
Institution
Date

POLICY DEVELOPMENT

2
Background

Cybersecurity is among the more urgent topics to the company leaders as well as the board
of directors’ agendas. Almost each week, new stories are coming up on data violations affecting
many customers' information, data in payment card as well as trade receipts loss. Cyber threats
sources are increasing in sophistication as well as evil intent. The professionals who deal with
cybersecurity not only should they focus on thwarting hackers which aim at disrupting your
organization or vandalize your web page, although they should too be ready to deal with warnings
from the groups of professional cyber-espionage or the intrusion sponsored by the government
(Biesenthal, Gudergan & Ambrosini, 2018). The latter is mainly the organizations which have
sustained willingness as well as the capability of causing real harm in your organization.
Analysis of current research
The attacks have been much common for the recent years where the conventional wisdom
in the community of cybersecurity has changed from a mindset of IF we are hacked to WHEN we
are cut. The companies that are readily prepared in a better way are changing their cybersecurity
strategies from focusing on outright avoidance to implementing techniques to detect breaches
quickly as well as control the damage when a violation has been confirmed.
Management of cybersecurity is a broad topic which requires substantial attention of an
organization to be successful. It is not the IT department’s responsibility only (Hickman & Silva,
2018). Through undertaking the activities together in an organization, there is a possibility of
mostly managing risks of cybersecurity effectively as well as have a long lasting program to
decrease the likelihood of exposure, control the extent as well as control t...


Anonymous
Just what I was looking for! Super helpful.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags