21 Aug IT 380 Milestone Two Guidelines And Rubric
Prompt. Use the informaTon on each of these topics to develop a customized training manual for newlyhired cybersecurity professionals at CyberLeet.
SpeciFcally, the followingcriTcal elementsmust be addressed:
When doing the assignment is take in consideration the 3 core of information security:
confidentiality, integrity and availability
I.How to Develop Cybersecurity Policies:In this part of the training manual, you will develop thecybersecurity policies in four disTnct areas for new hires at CyberLeet. Based on informaTonyou have learned on cybersecurity use and governance, you will develop policies for end-userpasswords, acceptable use, basic users, and user training. For each of these areas, follow theguiding quesTons to develop e²ecTve use policies that new hires will be trained on.
A.What principles should the informaTon security analyst apply in order to developappropriate password policies for their clients? Make sure you address conFdenTality,integrity, and availability of informaTon.
– Password length and composiTon of the password (e.g., uppercase, numbers,special characters)
-Time period between resets and ability to reuse a prior password
– DiferenTated policies for diferent types of users (e.g., administrator vs. regularuser)
B.What principles should the information security analyst apply in order to develop appropriate acceptable use policies for the client?
– What should users generally be allowed to do with their computing and network resources? When and why would each example be allowable?
– What should users generally be prohibited from doing with their computing andnetwork resources? When and why would each example require prohibition?
– When and why should users be aware of acceptable use policies and how canorganizations keep track of these policies?
C.What principles should the information security analyst apply in order to develop appropriate user training policiesfor the client?
– How to determine who would be trained
– How to determine how oFen trainings would occur
– How to determine whether certain staff receive additional training or whether they should be held to higher standards
D.What principles should the information security analyst apply in order to develop appropriate basic user policiesfor the client ?
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Wridemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
