Reference no: EM133928379 , Length: Word Count:1200 words
Question: Imagine you are a security professional, and the CEO of the company you work for is impressed with your success in developing and implementing a cybersecurity strategy over the past few weeks. As proprietary business information has become the company''s most valuable asset, you are now tasked with creating an information system management strategy that protects business operations and assets from cybercriminal activities.
The CEO has asked you to create a data protection guide in which you explain data security measures associated with information systems and platforms. The guide should also serve as a reminder to employees on how to recognize common cyberattacks, report suspicious activity, and follow basic cybersecurity hygiene practices.
Assessment Prep Read Continuous Diagnostics and Mitigation Program: Data Protection Management - How Is Data Protected? from CISA for information on data protection and loss prevention.
Assessment Deliverable
Write a 1,050- to 1,400-word data protection guide in which you perform a systems analysis that includes data security measures associated with information systems and platforms. Include the following in your data protection guide: Describe the most common types of data breaches and cyberattacks that could threaten the company's sensitive information.
Describe the company's policy on sharing and transmitting sensitive information. Address the following questions: Do employees possess the knowledge and skills to perform their jobs with security in mind? Does the company restrict access and privileges to only employees who need it? Does the company remove access when current and former employees no longer need it? Explain best practices for creating strong, secure passwords, and why multi-factor authentication (MFA) is important. Address the following questions: Are employees using password managers to protect strong passwords? Get expert online assignment help in the USA.
How does the company ensure that default manufacturer passwords are replaced on all information systems?
Explain what basic cyber hygiene is and how employees can incorporate these practices into their daily routines. Address the following questions:
How is the company securely sanitizing and destroying data and data storage devices when they are no longer needed?
Is the company configuring tablets and laptops to enable full-disk encryption to protect data? Are employees regularly updating and patching software and operating systems?
Are employees regularly backing up their essential data? Cite at least 2 peer-reviewed, scholarly, or similar references. Format your citations and references according to APA guidelines. Submit your assessment. Assignment Tips: Keep your audience in mind. You are creating a guide for employees.
Think about the guides you have seen at work or other places. Be sure to meet the word count and address each topic. Be sure to proofread your assignments.
Content can be lost in grammatical errors. Be clear, concise, detailed in your writing. Cite your sources in APA format. Sources must be academic in nature.