What issues can arise in relation to with BYOD policies and

Assignment Detail:- Part - Cyber Security Awareness Scenario:Read through the Part document on Canvas and create the following report- You will need to use the Information Technology Cyber Security Policy- Your document must include: 1- Policiesa- Develop a set of policies and procedures for a work area that promote cyber security awareness and practices-i- Is your login/screen locked down????ii- Is your OS up to date????iii- Do you have a strong password policy????iv- Do you run antivirus updates, or utilize anti-virus, anti-malware and DNS filters????v- Do you dispose of all data and equipment properly????vi- Are mobile devices protected????vii- Are employees educated????viii- Do you have a security, backup and recovery plan in place????ix- Do you know who to call for help???? 2- Traininga- Create a PowerPoint to arrange training or updates to the employees to increase their awareness in cyber security matters -at least 2- from the following example:i- Phishing attacksii- Removable mediaiii- Passwords and authenticationiv- Physical securityv- Mobile device securityvi- Working remotelyvii- Public Wi-Fiviii- Cloud securityix- Social media usex- Internet and email usexi- Social engineeringxii- Security when working from home 3- Referencinga- The Referencing style that we use is APA style- Knowledge questions Question 1- What is cyber security???? Question 2- Why Does Cyber Security Matter???? Question 3- Create a list of at least 5 sources of information you can access to determine new cyber security threats and trends- Question 4- Which employees should complete cybersecurity awareness training courses???? Question 5- What topics should be covered in cyber defence training???? Question 6- Why would you need a cyber security policy in your workplace and what should be included???? Question 7- Outline the typical issues that should be addressed in a security review- Question 8- What does the Notifiable Data Breaches Scheme entail???? Question 9- Who's responsibility is cyber security in a workplace???? Question 10- A hacker locks out users and encrypts their personal computer files and data, holding it hostage until they agree to pay to the attacker- What is this practice called???? Group of answer choices-a- Browser hijacker-b- Ransomware-c- Brute-force Question 11- What issues can arise in relation to with BYOD policies???? Question 12- How could you educate employees on cyber security???? Attachment:- Cyber Security Awareness-rar

Most Recent Questions


Helping Students for Excellence in Academics, GET Help with Assignment? Order Now