Successful execution of the plan

Assignment Help Basic Computer Science
Reference no: EM131293562

The Security Plan-What Employees Need to Know

After the SAP has been designed, it is time to develop all the supporting materials needed for a successful execution of the plan. During the development phase, it is not only essential to take a close look at the list of identified security topics but also to decide what level of training or awareness is needed on each issue.  For example, if employees only need to be aware of a certain policy or procedure, a simple e-mail advisory may be enough.  However, if employees need to develop a certain skillset, it may be necessary to develop a day-long seminar or a comprehensive course. In addition, it is important to think about whether multiple methods of communication are appropriate for certain security topics.

For this Discussion, you will consider what employees of an organization need to know about an organization's security.

Assume you are developing a security plan for a typical mid-size company of just under 500 employees. Analyze the security needs for a company of this size and determine what employees need to know about at least two security topics that need to be covered for this organization. Take into consideration items from the security topics contained in section 4.1.1 of NIST-SP800-50 from this unit's Learning Resources.

Post a 350- to 500-word evaluation of what employees need to know about at least two security topics.  In your evaluation, include the employee behavior(s) an organization should work to enforce and an explanation of materials that should be developed to successfully educate the employees.

Reference no: EM131293562

Questions Cloud

Discuss specific changes in supply and demand : Discuss specific changes in supply and demand. Examine prior government policies and legislation that exacerbated the impact of the shocks.
How does transportation add value in a supply chain : How does transportation add value in a supply chain?What are the potential disruptions in transportation?How do the disruptions impact the performance of a supply chain?
Describe influence that corporate social responsibility has : Identify how the organization applies corporate social responsibility to the business. Evaluate the influence that corporate social responsibility has on the organization.
Analyze sources to support the teams decision : Identify sources to support the team's decision and explain why the sources are credible. Include an explanation as to the difference between claims and sources and the effect this has on the decision.
Successful execution of the plan : After the SAP has been designed, it is time to develop all the supporting materials needed for a successful execution of the plan. During the development phase, it is not only essential to take a close look at the list of identified security topic..
Identify the end goal of your social influence : Identify the end goal of your social influence. Explain who you are trying to persuade and exactly what are you trying to persuade them about. Are your targeting an attitude, a belief, a value, a behavior, or a combination of these?
Discuss how to use the power of each design most effectively : Discuss the benefits of using both designs in the research study. Determine which design (qualitative or quantitative) will become the primary research design. Discuss how to use the power of each design most effectively.
Charge of training in a petroleum company : Consider this scenario. You are the human resources manager in charge of training in a petroleum company. You have been asked to design and develop a comprehensive new training system which will be used to ensure those employees who use templat..
What is the brand : MKTG-102-5 Principles of Marketing-What is the brand?How many sold the first weekend? What changes in each model ? Why is there different models Uses behind?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Margin of a digital logic gate

How to improve the noise margin of a digital logic gate implemented in CMOS? When does it make sense to use structural Verilog instead of behavioral Verilog?

  Implementation of security mechanisms

A security designer is planning the implementation of security mechanisms in a RBAC (Role Based Access Control) compliant system. The designer has determined that there are three types of resources in the system including files, printers, and mail..

  Inflation rate and work out a spending program

Assume a 4% inflation rate and work out a spending program for your retirement that will allow you to increase your expenditure in line with inflation.

  Determining the potential customers

ABC Inc. wants to build a new web site to sell their "clearance" products and they are planning to publish a proposed website site designed to obtain feedback from "potential customers".

  Describing the different types of firewalls

Compose a letter to your CEO describing the different types of firewalls and where each should be used/deployed within the Hypothetical Fortune 500 network. This is a minimum 2-page paper with references

  Write a regular expression for the language accepted

So far we have been dealing with Fa's over the alphabet. {a, b}. Let us consider for the moment the alphabet ∑ - {a, b, c}.

  Let''s discuss the i/o classes available to us in java

What are the different ways we can use collections and how would go about it?

  Measure of the remaining angle

a quadrilateral, each of the two angles has a measure of 37 degrees. Another angle has a measure of 118 degrees. What is the measure of the remaining angle?

  What is government surveillance

What is government surveillance? Is it essential to National security or a violation of my privacy?

  Quality healthcare through quality information

Quality Healthcare through Quality Information

  Compute the variance and standard deviation of each cluster

Compute the representation of the cluster as in the BFR Algorithm. That is, compute N, SUM, and SUMSQ.

  Examples of data structures for storing a sparse matrix

The complete pivoting strategy is numerically stable, whereas partial pivoting is not always stable. Why is the latter approach preferred in practice in spite of this?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd