Weaknesses of a security awareness program

Assignment Help Basic Computer Science
Reference no: EM131258953

Weaknesses of a Security Awareness Program

A security plan is only as strong as the awareness program that introduces and illuminates it to the employees of an organization. In order to develop strong SAPs, you must develop a broad understanding of techniques and best practices for their design and implementation.  With this understanding comes the ability to evaluate existing programs and identify weaknesses in those programs.

For this Discussion, you will analyze the weaknesses of the security awareness program implemented for the fictional company Advanced Topologies, Inc.

The details of Advanced Topologies and some of the security issues they have already faced are described in the case study of your textbook.

Consider the following scenario:

You have been hired as a security awareness consultant at Advanced Topologies. Part of your job is to take a close look at the company's existing security awareness program and analyze any weaknesses in the program. 

Advanced Topologies has provided you with a document that outlines this existing program. It includes the following summarized list of the activities that have been put in place:

Mandatory New Hire Orientation-a presentation from the IT department that includes password usage and management, the spam abatement program, and appropriate web usage.

Brown Bag Seminar-Starting 3 months ago, the IT department has been holding an optional seminar once a month to provide employees with information on various security topics.  Past talks include information on how to handle unknown e-mail attachments, laptop security while traveling, and how to secure personal home computers.

Yearly Security Meeting for Top Executives only-Once a year, the IT department goes over the security breaches that have occurred over the past year and describes any precautions that have been put in place to help prevent them.  In the past, there have been a few phishing attempts, but nothing else of significance has been reported.

What weaknesses can you see in Advanced Topologies' program? What improvements would you recommend?

Post a 350- to 500-word analysis of the existing security awareness program at Advanced Topologies. Include in your analysis an explanation of at least two weaknesses you see in the existing program. In addition, describe improvements to the SAP that you would propose to help eliminate these weaknesses.

Reference no: EM131258953

Questions Cloud

Did the literature review consistently set up the research : In order to write a review of the research article you are to use the outline listed below. You need to express some opinions about the adequacy or appropriateness of the author(s)'s effort in each of the main sections. For example, did the lite..
Consider three different processors : Consider three different processors P1, P2, and P3 executing the same instruction set. [10 points] P1 has a 3 GHz clock rate and a CPI of 1.5.
Determining the encoding mechanisms : List all of the IrDA (infrared) encoding mechanisms, and if possible please specify what they do.
Designing a solution for a java programming problem : In your opinion, what are the three biggest challenges in planning and designing a solution for a Java programming problem? What can you do to overcome these challenges? How would you apply these techniques to the programs in this class?
Weaknesses of a security awareness program : A security plan is only as strong as the awareness program that introduces and illuminates it to the employees of an organization. In order to develop strong SAPs, you must develop a broad understanding of techniques and best practices for their d..
Identify different groups of users of financial statements : Identify six different groups of users of financial statements, who would be interested in this company (ensure that both internal and external users are fairly represented).
What role do parents or caregivers have in the conference : What strategies can you use to ensure that parents/caregivers feel welcome and comfortable at the beginning of the conference? What method can you use to summarize the student's progress?
What are your observations : Using the MATLAB instruction cond, find the condition numbers of Hilbert matrices for n = 4,5,...,12. Plot these condition numbers as a function of n using semilogy. What are your observations?
Nist security models : The design of a security awareness program depends on many factors. One important factor is how the organization will develop and distribute security information. Determining whether the strategies and implementation of an SAP are set centrally or..

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Problem regarding different business functions

1. Companies generally need to use more than one information system to support all their different business functions. These functions are frequently referred to as either front- office information systems or back- office systems.

  How can she increase the number of files

A Microsoft Word user noticed that another user in her department has more than four files listed in the recently used files list in the Files pull-down menu. How can she increase the number of files listed on her computer

  Write a program that prompts the user for a measurement

write a program that prompts the user for a measurement in meters and then converts it to miles, feet and inches.

  Understanding of the various issues

This assignment demonstrates your understanding of the various issues around the OS scheduler.  It also serves to help move you along with the final project.

  What do the following commands do

What do the following commands do

  Successful project manager

Year 2022, you are a successful Project Manager and have recently hired a new internee (who haven't taken software engineering course yet) to strengthen industry-academia linkage. One day, the internee enters to your office and says "Why our cust..

  Write a program that creates two vectors from x-one

write a program that creates two vectors from x-one (call it P) that contains the positive elements of x, and a second (call it N) that contains the negative elements of x. In both P and N, the elements are in the same order as in x.

  Create a farewell speech that includes good memories

You, your classmates and instructor have been working together over the session as a team. Through discussion board tasks and Individual projects, you have shared thoughts, ideas and information you have learned. It is now time to move forward wit..

  The feasibility study-assignment overview

IT systems are a major capital investment and the systems analyst is called to investigate the feasibility of a system and help answer the questions - Will the system pay for itself? In how long will it pay off? Are the other technologies that wil..

  Find a function h giving the area polluted in terms of t

Find a function h giving the area polluted in terms of t.

  What kinds of solutions might you propose

Consider applying a voice and video over an IP solution for a company interested in enabling its geographically distributed sales force to collaborate efficiently

  What are some of the services available to you in your area

Each organization will have a certain collection of services available (like Frame Relay) but this is dependent upon provider provisioning, cost and customer premises equipment. What are some of the services available to you in your area?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd