Weaknesses of a security awareness program

Assignment Help Basic Computer Science
Reference no: EM131257613

Weaknesses of a Security Awareness Program

A security plan is only as strong as the awareness program that introduces and illuminates it to the employees of an organization. In order to develop strong SAPs, you must develop a broad understanding of techniques and best practices for their design and implementation. With this understanding comes the ability to evaluate existing programs and identify weaknesses in those programs.

For this Discussion, you will analyze the weaknesses of the security awareness program implemented for the fictional company Advanced Topologies, Inc.

The details of Advanced Topologies and some of the security issues they have already faced are described in the case study of your textbook.

Consider the following scenario:

You have been hired as a security awareness consultant at Advanced Topologies. Part of your job is to take a close look at the company's existing security awareness program and analyze any weaknesses in the program.

Advanced Topologies has provided you with a document that outlines this existing program. It includes the following summarized list of the activities that have been put in place:

Mandatory New Hire Orientation-a presentation from the IT department that includes password usage and management, the spam abatement program, and appropriate web usage.

Brown Bag Seminar-Starting 3 months ago, the IT department has been holding an optional seminar once a month to provide employees with information on various security topics. Past talks include information on how to handle unknown e-mail attachments, laptop security while traveling, and how to secure personal home computers.

Yearly Security Meeting for Top Executives only-Once a year, the IT department goes over the security breaches that have occurred over the past year and describes any precautions that have been put in place to help prevent them. In the past, there have been a few phishing attempts, but nothing else of significance has been reported.

What weaknesses can you see in Advanced Topologies' program? What improvements would you recommend?

Post a 350- to 500-word analysis of the existing security awareness program at Advanced Topologies. Include in your analysis an explanation of at least two weaknesses you see in the existing program. In addition, describe improvements to the SAP that you would propose to help eliminate these weaknesses.

Reference no: EM131257613

Questions Cloud

Describe the importance of situating a societys cultural : Explain the importance of situating a society's cultural and artistic expressions within a historical context. Examine influences of intellectual, religious, political, and socio-economic forces on social, cultural, and artistic expressions.
What is the expected value of perfect information : Discuss the differences between decision making under certainty, under risk, and under uncertainty. -  What is a decision tree?
How evidence-based research influences healthcare industry : Write a 900- to 1,250-word paper that discusses the following: Inform the reader of your chosen innovation and provide background information/history about it. Explain how evidence-based research influences the healthcare industry
Income tax expense-deferred income taxes-income tax payable : Following is information concerning the difference between Guilbert Corporation's taxable income and its GAAP income. Prepare the journal entry to record income tax expense, deferred income taxes, and income tax payable for 2014.
Weaknesses of a security awareness program : A security plan is only as strong as the awareness program that introduces and illuminates it to the employees of an organization. In order to develop strong SAPs, you must develop a broad understanding of techniques and best practices for their d..
Pros and cons of hiring multi craft maintenance personnel : What are the advantages and disadvantages of giving more responsibility for machine maintenance to the operator? - Discuss the pros and cons of hiring multi-craft maintenance personnel.
Nist security models : The design of a security awareness program depends on many factors. One important factor is how the organization will develop and distribute security information. Determining whether the strategies and implementation of an SAP are set centrally or..
Explain reid objection to locke account of personal identity : What is Wiggins' argument that seems to show we can have (at least) two objects of the same sort in the same place at the same time? Be sure to include in your explanation an explanation of why Tibbles at t3 is not identical to Tib at t3.
Define power distance in one sentence : Please define Power Distance in one sentence and summarize the differences (if any) in Power Distance among Russia, Venezuala, Japan and Bhutan

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How consider the un-pipelined processor

Consider the un-pipelined processor

  What do you mean by data independence

What do you mean by data independence? Explain your answer, paying attention to how data independence is implemented.

  The debate about centralization and decentralization

1. The debate about centralization and decentralization is heating up again with the advent of network computing and the increasing use of the Internet. Does the Internet make this debate more relevant? If you find any interesting articles on t..

  What is the asymptotic complexity of this solution

Use the PR quadtree to implement an efficient solution to Problem 6.5. That is, store the set of points in a PR quadtree. For each point, the PR quadtree is used to find those points within distance D that should be equivalenced. What is the asymp..

  Write program that asks user how many students to process

Write a program that asks the user how many students to process (must be at least 1, but no more than 20) and then reads in the scores for three items, an exam average score (double number), lab average score (double number) and homework average s..

  Spelling and grammar errors

Create a document with three parts: a cover letter, resume, and interview thank you letter. Be sure to include ALL THREE PARTS in the SAME document. Be sure to check for spelling and grammar errors

  Write the commands to remove all the space character

Write the commands to remove all the space characters stored in the shell variable text. Be sure to assign the result back to text. First use tr to do it and then do the same thing with sed.

  What events need to be added to the event table

What events need to be added to the event table? Complete the event table entries for these additional events. What activities or use cases for existing events might be changed because of a charge account and payment plan? Explain.

  Software development cycles

There are software development cycles, project life cycles, and product life cycles. Research and read about each through the course materials and internet. Describe how the three fit together

  Corporate budgeting in terms of paying for it

1. Define the terms allocation, chargeback and corporate budgeting in terms of paying for IT. Give a business advantage and a disadvantage of each. 2.. Briefly define TCO as a way to cost an IT purchase. What are TCO's benefits?

  What operations can be used on pointer variables

In C++, what operations can be used on pointer variables? Why use these operations?

  Create a class that simulates an alarm clock

create a class that simulates an alarm clock. In this class you should *store time in hours, minutes, and seconds. Note if time is am or pm. (hint: you should have separate private members for the alarm and the clock.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd