Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

The Security Plan-What Employees Need to Know

After the SAP has been designed, it is time to develop all the supporting materials needed for a successful execution of the plan. During the development phase, it is not only essential to take a close look at the list of identified security topics but also to decide what level of training or awareness is needed on each issue.  For example, if employees only need to be aware of a certain policy or procedure, a simple e-mail advisory may be enough.  However, if employees need to develop a certain skillset, it may be necessary to develop a day-long seminar or a comprehensive course. In addition, it is important to think about whether multiple methods of communication are appropriate for certain security topics.

For this Discussion, you will consider what employees of an organization need to know about an organization's security.

Assume you are developing a security plan for a typical mid-size company of just under 500 employees. Analyze the security needs for a company of this size and determine what employees need to know about at least two security topics that need to be covered for this organization. Take into consideration items from the security topics contained in section 4.1.1 of NIST-SP800-50 from this unit's Learning Resources.

Post a 350- to 500-word evaluation of what employees need to know about at least two security topics.  In your evaluation, include the employee behavior(s) an organization should work to enforce and an explanation of materials that should be developed to successfully educate the employees.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92048226
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Question as you are reviewing the results of your various

Question : As you are reviewing the results of your various scans, what factors do you believe you would take into consideration when determining priority? The priority would be used to determine remediation efforts. So, ...

Explain that this threat represents a well-known and broad

Explain that this threat represents a well-known and broad category of electronic and human activities that breach the confidentiality of information.

Question a small computer on a smart card has four page

Question : A small computer on a smart card has four page frames. At the first clock tick, the R bits are 0111 (page 0 is 0, the rest 1). At subsequent clock ticks, the values are 1011, 1010, 0101, 1010, 0010, 1100, and ...

Question suppose a payroll system secretly leaks a list of

Question : Suppose a payroll system secretly leaks a list of names of employees earning more than a certain amount each pay period. Who would be harmed by such a vulnerability? How could such a vulnerability come about? ...

Systems analysis project personal trainer inc owns and

Systems analysis project Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an international expansion by opening a new "superce ...

Suppose that we want to convert the small computer into a

Suppose that we want to convert the small computer into a 16- bit RISC type of processor (address and data buses are both 16-bits wide and each instruction is supposed to occupy 16 bits in the instruction memory). If the ...

Question research microwave serices and report on what

Question : Research microwave serices and report on what kinds of applications can be supported, what equipment will be necessary, where the equipment will be located, and what services these companies that offers.

The monthly sales demand for a new product is uncertain but

The monthly sales demand for a new product is uncertain, but it is considered to be adequately described by a normal random variable with mean 50,000 units and variance 100,000,000. (a) A factory to manufacture the new p ...

Summarizes the results of a risk assessment for business

Summarizes the results of a risk assessment for Business Continuity Risk. Determine the steps that can be taken to mitigate Business Continuity risks. What's identified should be cost-effective based on the overall risk ...

How do you find the minimum sample size when population

How do you find the minimum sample size when population standard deviation is anywhere between 14 to 24, and the half-width B desired could be anywhere between 2 to 7?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As