Reference no: EM133885713 , Length: word count:500
Cybersecurity Principles and Organisational Practice
Learning Outcome 1: Describe human factors and their cybersecurity consequences on business operations
Learning Outcome 2: Appraise cybersecurity standards and governance requirements to safeguard humans users within an organisation
Assessment Task
Write a 500-word (+/- 10%) report about the human factor in a company's cybersecurity environment. The report will explore the influence of the human factor in cybersecurity and the legal or other regulatory requirements that apply to cybersecurity practices. The content of the report must be supported by relevant diagrams.
Please refer to the instructions section below for details of how to complete this task.
Context
Cybersecurity is a broad field that includes many different areas of expertise. Anyone working in cybersecurity must possess a basic knowledge of field related terminology and general procedures. This includes knowledge of key technical and organisational methods that can be used to implement security measures, how the human factor influences key decisions regarding which security methods to implement and why the human factor needs to be addressed when setting up a cybersecurity project. In this assessment you will need to write a report which addresses specific questions around that knowledge in order to prepare you for your future studies and work in cybersecurity related roles. Get online assignment help services Now!
Instructions
To complete this assessment task, you must write a 500-word (+/- 10%) report discussing the importance of the human factor in a company's cybersecurity environment. Please review all learning resources for Modules 1-3 prior to writing the report.
The content of the report should:
provide a definition of cybersecurity
explain why addressing cybersecurity is an ongoing task for an organisation
discuss recent cybersecurity threats and attacks and how they are exploited by hackers
evaluate attack vectors that are not user-specific (e.g., brute-force password attack)
evaluate successful attack vectors which are specific to human activities (user- specific)
discuss the role of governance, which is based on cybersecurity frameworks and determines the regulations and/or laws that are required for effective cybersecurity practices
include a list of applicable local (Australian) and international laws and branch- specific regulations that have been created by business organisations. (Please ensure that you include indirect regulations that require cyber security measures), and;
include relevant diagrams which demonstrate the relationships between human activity, cybersecurity threats and cybersecurity attack vectors.
The report should be written for people with very limited technical knowledge.
In addition to the recommended readings from Modules 1-3 you must support your report with further information obtained by reviewing peer reviewed articles and textbooks. Search specifically using the terms "cybersecurity governance" and "human factors in cybersecurity".
Referencing
It is essential that you use current APA style for citing.
|
What kind of social influence was exhibited
: What kind of social influence was exhibited when subjects agreed with a clearly wrong answer presented by the group? How do you know?
|
|
Identify the committee hosting the hearing
: Identify the Committee hosting the Hearing, the Subject Matter Expert, and the important aspects of testimony related to issues.
|
|
What was your family composition
: What was your family composition? What was your first childhood memory? What was your longest committed relationship?
|
|
What was one limitation of the asch study
: Read Stanley Milgram Shock Experiment: Summary, Results, & Ethics and answer the questions. What was one limitation of the Asch study?
|
|
Explain why addressing cybersecurity is an ongoing task
: CPO442 Cybersecurity Principles and Organisational Practice, Torrens University - Describe human factors and their cybersecurity consequences on business
|
|
Discuss safety hazards observed in the client home
: Discuss the safety hazards observed in the client's home. Describe any nursing actions you would take to promote safety.
|
|
Differences between us court system and state court systems
: What are some of the similarities and differences between the U.S. Court System and the State Court Systems. Be specific with examples?
|
|
Diagnosed with autism
: So there is this 2nd grader he was diagnosed with autism. His strengths include playing roblox, coding, and reading. In school he slapped his teacher,
|
|
What method did milgram use in his obedience study?
: Read Stanley Milgram Shock Experiment: Summary, Results, & Ethics and answer the questions below. What method did Milgram use in his obedience study?
|