Criminal Justice Question

Imagine you are a security professional, and the CEO of the company you work for is impressed with your success in developing and implementing a cybersecurity strategy over the past few weeks. As proprietary business information has become the company’s most valuable asset, you are now tasked with creating an information system management strategy that protects business operations and assets from cybercriminal activities. The CEO has asked you to create a data protection guide in which you explain data security measures associated with information systems and platforms. The guide should also serve as a reminder to employees on how to recognize common cyberattacks, report suspicious activity, and follow basic cybersecurity hygiene practices.

Assessment Prep

Read from CISA for information on data protection and loss prevention.

Assessment Deliverable

Write a 1,050- to 1,400-word data protection guide in which you perform a systems analysis that includes data security measures associated with information systems and platforms. Include the following in your data protection guide:

  • Describe the most common types of data breaches and cyberattacks that could threaten the companys sensitive information.
  • Describe the companys policy on sharing and transmitting sensitive information. Address the following questions:
  • Do employees possess the knowledge and skills to perform their jobs with security in mind?
  • Does the company restrict access and privileges to only employees who need it?
  • Does the company remove access when current and former employees no longer need it?
  • Explain best practices for creating strong, secure passwords, and why multi-factor authentication (MFA) is important. Address the following questions:
  • Are employees using password managers to protect strong passwords?
  • How does the company ensure that default manufacturer passwords are replaced on all information systems?
  • Explain what basic cyber hygiene is and how employees can incorporate these practices into their daily routines. Address the following questions:
  • How is the company securely sanitizing and destroying data and data storage devices when they are no longer needed?
  • Is the company configuring tablets and laptops to enable full-disk encryption to protect data?
  • Are employees regularly updating and patching software and operating systems?
  • Are employees regularly backing up their essential data?

Cite at least 2 peer-reviewed, scholarly, or similar references.

Format your citations and references according to APA guidelines.

Submit your assessment.

Assessment Support

  • Review the for guidance on deliverable expectations.
  • Review the following resources for writing guidelines and APA information:

WRITE MY PAPER

Comments

Leave a Reply