Case study-designing a seta program

Assignment Help Basic Computer Science
Reference no: EM131446355

Case Study: Designing a SETA Program

Anytown USA Bank prides itself on being very responsive to its customers. It offers 24-hours staffed customer care center with a toll- free number, over the past year, there has been a significant decline in calls and a corresponding increase in email services request. As information Security Officer (ISO), you are very concerned that customer information classified as protected is being sent via email or email attachment. You have requested a meeting with the director of IT to explore secure email options since regular email is sent across the internet in plain text. In the meantime, you want to make sure that employees understand the danger of using regular email.

Working with the training department, you are going to launch a security awareness campaign. The theme is "". The message is that users should never write anything in an external email that they wouldn't write on a postcard.Create a security awareness campaign focused on the topic. Include in this plan specific on how you intend to deliver the message.Create at least one piece of supporting collateral.Design a way to test the effectiveness of your message.Before launching the campaign, you want to make sure you have the full support of the executive management.What type of "educational" program would you develop for the management?What would the message be?Outline the SETA program that will be needed to ensure the success of the "secure email" application.

Note: Please this should be answered as listed and any references can be added on a separate page.

Reference no: EM131446355

Questions Cloud

Write an film critique essay : The thesis statement is criticizing the flim "Pocahontas" is a story which beauify the European Colonist in American - Write an film Critique essay
Number of vertices with an odd degree : Since in an undirected graph, the number of vertices with an odd degree must be even, theremust be 2n vertices that can be paired up into n pairs. Why?
Explain the differences between accessing the internet : Explain the differences between accessing the Internet via a modem, DSL, a cable modem, and satellite. Which of these access mechanisms are likely to become more important in the future?
What are the differences between scripting and programming : Believe it or not, many professionals believe that if you know only scripting languages, you are not a programmer. What are the differences between scripting and programming? Is one harder to learn/apply than the other is? Research what code portabil..
Case study-designing a seta program : Anytown USA Bank prides itself on being very responsive to its customers. It offers 24-hours staffed customer care center with a toll- free number, over the past year, there has been a significant decline in calls and a corresponding increase in e..
Identify the purpose of the article : identify the author, the name of the article, and the date and place of publication and identify the main idea/argument/position/assumption of the author,
Why is python a great starter language : Why was BASIC good in the past? Why have we moved to Python? Feature-by-feature, how powerful is BASIC vs. Python? Which language of the two do you feel would be more valuable in your career?
Evaluate subprime loans with notion of social responsibility : Critique the role of leadership decision-making in the subprime loan financial crisis. Evaluate subprime loans with the notion of social responsibility. Compare and contrast the resulting consequences for these actions.
Discuss about the workstation software and server software : One factor that IT professionals must consider when building a server is whether that server should be simply server software installed on regular hardware; server software installed on server hardware; or regular software installed on server har..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Relationship between function templates and overloading

Distinguish between the terms "function template" and "function-template specialization."

  Why target overlooked or ignored the red flag(s).

Conclude the main reasons why the attack on Target occurred. Give your opinion as to whether or not the attack was mainly due to the poor infrastructure or the inability of management to act accordingly. Justify your response.

  Investigate the different modulation techniques

To find out more technical details about DSL, investigate the different modulation techniques that are used to transmit DSL signals. Although these techniques are quite complex, they are an interesting study in the technological advances necessar..

  Linux-support skills

After completing the activities, take a screenshot of the following and copy onto this report. Linux+ Support skills: Editing Files in Linux

  Implement unsigned 8-bit multiplication and division algorit

Implement unsigned 8-bit multiplication and division algorithms in MIPS assembly language. You need to follow the multiply and divide algorithms as given in the textbook or the slides. You must NOT use any MIPS multiplication or division instru..

  How you would plan an iis7 application hosting

From the first e-Activity, discuss the uses and advantages for an enterprise utilizing an SMTP server.

  How easy or difficult would it be initiate such advantages

More generally, to what extent do specific technologies help companies gain an edge over their competitors? How easy or difficult would it be to initiate such advantages?

  Overview of social engineering

Explain how Social Engineering can be seen as a threat to the corporate entity by using a creative tool such as PowerPoint® Include all of the following in your explanation:

  Find the surface area of that portion of the larger sphere

As shown in FIGURE 9.R.4, a sphere of radius 1 has its center on the surface of a sphere of radius a > 1. Find the surface area of that portion of the larger sphere cut out by the smaller sphere.

  Similarities between a lumped and a distributed element

What are the differences and similarities between a lumped element and a distributed element. How many steps are required to design a) an RF circuit? b) A microwave circuit?

  Conceptual model of a two-dimensional array

1. Describe the conceptual model of a two-dimensional array. Include in your explanation how a two-dimensional array might be used, why these arrays are similar to tables, and how to declare and initialize a two-dimensional array.

  Discussion and dropbox assignment

In a professional environment, you typically create three interface-layout designs and show them to the client. Then, the client and you, together, select one of these designs. The complete website development is based on this design.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd