Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

ormation security:

Prompt. Use the information on each of these topics to develop a customized training manual for newly hired cybersecurity professionals at CyberLeet.

Specifically, the following critical elementsmust be addressed:

When doing the assignment is take in consideration the 3 core of information security: confidentiality, integrity and availability

Need assignment help for this question?

If you need assistance with writing your essay, we are ready to help you!

OUR PROCESS

Order

Payment

Writing

Delivery

Why Choose Us: Cost-efficiency, Plagiarism free, Money Back Guarantee, On-time Delivery, Total Сonfidentiality, 24/7 Support, 100% originality

  1. How to Develop Cybersecurity Policies: In this part of the training manual, you will develop the cybersecurity policies in four distinct areas for new hires at CyberLeet. Based on information you have learned on cybersecurity use and governance, you will develop policies for end-user passwords, acceptable use, basic users, and user training. For each of these areas, follow the guiding questions to develop effective use policies that new hires will be trained on.
    1. What principles should the information security analyst apply in order to develop appropriate password policies for their clients? Make sure you address confidentiality, integrity, and availability of information.

•           Password length and composition of the password (e.g., uppercase, numbers, special characters)

•           Time period between resets and ability to reuse a prior password

•           Differentiated policies for different types of users (e.g., administrator vs. regular user)

  • What principles should the information security analyst apply in order to develop appropriate acceptable use policiesfor the client?

•           What should users generally be allowed to do with their computing and network resources? When and why would each example be allowable?

•           What should users generally be prohibited from doing with their computing and network resources? When and why would each example require prohibition?

•           When and why should users be aware of acceptable use policies and how can organizations keep track of these policies?

  • What principles should the information security analyst apply in order to develop appropriate user training policiesfor the client?

•           How to determine who would be trained

•           How to determine how often trainings would occur

•           How to determine whether certain staff receive additional training or whether they should be held to higher standards

  • What principles should the information security analyst apply in order to develop appropriate basic user policiesfor the client?

•           When and why should users have to display some type of identification while in the workplace?

•           What types of physical access (with or without ID) to company areas is acceptable? Why?

•           When and why should employees with identification be allowed access to all areas of the company?

•           When and why should employees be allowed to take work home or bring guests into the workplace?

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"