Explain why addressing cybersecurity is an ongoing task

Assignment Help Computer Engineering
Reference no: EM133885713 , Length: word count:500

Cybersecurity Principles and Organisational Practice

Learning Outcome 1: Describe human factors and their cybersecurity consequences on business operations

Learning Outcome 2: Appraise cybersecurity standards and governance requirements to safeguard humans users within an organisation

Assessment Task

Write a 500-word (+/- 10%) report about the human factor in a company's cybersecurity environment. The report will explore the influence of the human factor in cybersecurity and the legal or other regulatory requirements that apply to cybersecurity practices. The content of the report must be supported by relevant diagrams.

Please refer to the instructions section below for details of how to complete this task.

Context
Cybersecurity is a broad field that includes many different areas of expertise. Anyone working in cybersecurity must possess a basic knowledge of field related terminology and general procedures. This includes knowledge of key technical and organisational methods that can be used to implement security measures, how the human factor influences key decisions regarding which security methods to implement and why the human factor needs to be addressed when setting up a cybersecurity project. In this assessment you will need to write a report which addresses specific questions around that knowledge in order to prepare you for your future studies and work in cybersecurity related roles. Get online assignment help services Now!

Instructions
To complete this assessment task, you must write a 500-word (+/- 10%) report discussing the importance of the human factor in a company's cybersecurity environment. Please review all learning resources for Modules 1-3 prior to writing the report.

The content of the report should:
provide a definition of cybersecurity
explain why addressing cybersecurity is an ongoing task for an organisation
discuss recent cybersecurity threats and attacks and how they are exploited by hackers
evaluate attack vectors that are not user-specific (e.g., brute-force password attack)
evaluate successful attack vectors which are specific to human activities (user- specific)
discuss the role of governance, which is based on cybersecurity frameworks and determines the regulations and/or laws that are required for effective cybersecurity practices
include a list of applicable local (Australian) and international laws and branch- specific regulations that have been created by business organisations. (Please ensure that you include indirect regulations that require cyber security measures), and;
include relevant diagrams which demonstrate the relationships between human activity, cybersecurity threats and cybersecurity attack vectors.
The report should be written for people with very limited technical knowledge.

In addition to the recommended readings from Modules 1-3 you must support your report with further information obtained by reviewing peer reviewed articles and textbooks. Search specifically using the terms "cybersecurity governance" and "human factors in cybersecurity".

Referencing
It is essential that you use current APA style for citing.

Reference no: EM133885713

Questions Cloud

What kind of social influence was exhibited : What kind of social influence was exhibited when subjects agreed with a clearly wrong answer presented by the group? How do you know?
Identify the committee hosting the hearing : Identify the Committee hosting the Hearing, the Subject Matter Expert, and the important aspects of testimony related to issues.
What was your family composition : What was your family composition? What was your first childhood memory? What was your longest committed relationship?
What was one limitation of the asch study : Read Stanley Milgram Shock Experiment: Summary, Results, & Ethics and answer the questions. What was one limitation of the Asch study?
Explain why addressing cybersecurity is an ongoing task : CPO442 Cybersecurity Principles and Organisational Practice, Torrens University - Describe human factors and their cybersecurity consequences on business
Discuss safety hazards observed in the client home : Discuss the safety hazards observed in the client's home. Describe any nursing actions you would take to promote safety.
Differences between us court system and state court systems : What are some of the similarities and differences between the U.S. Court System and the State Court Systems. Be specific with examples?
Diagnosed with autism : So there is this 2nd grader he was diagnosed with autism. His strengths include playing roblox, coding, and reading. In school he slapped his teacher,
What method did milgram use in his obedience study? : Read Stanley Milgram Shock Experiment: Summary, Results, & Ethics and answer the questions below. What method did Milgram use in his obedience study?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd