Chat with us, powered by LiveChat Standards, Policies, and Guidelines Definition | Wridemy

Standards, Policies, and Guidelines Definition

Project 4 Start Here
As you have previously learned, organizations must implement countermeasures to protect information and data that are vulnerable to cyberattacks, not only from external sources but from internal sources. In this project, you will research and investigate topics in order to draft guidelines for your assigned organization’s human resources department to help upper management identify insider threats and to forestall future attempts. Topics include investigating hacker psychological profiles and the danger of profiling employees.

You will use your findings to prepare a preliminary set of standards, policies, and/or guidelines for management to use in the event of a perceived insider threat.

This is the fourth of six sequential projects. There are 14 steps in this project. Begin below to review your project scenario.

Project Scenario

As you go through the morning’s e-mail, you notice one from your boss that links to an article about the Terry Childs cyber breach case. Childs, an administrator in the San Francisco IT department who had sole control of the city-wide network, refused to provide passwords to anyone else after a dispute with a city official, effectively locking down the network. “Let’s discuss this,” says your boss at the end of the e-mail, and you proceed to meet with him in his office.

Your boss points out that the Childs case indicates the vulnerability of any network in which one administrator has too much control. “While that isn’t likely to happen here,” the boss says, “we need to ensure that we have the proper standards, policies, and guidelines to ensure the safety of our systems.”

In addition, your boss points out that even though Childs is an “insider,” his actions resemble those of a typical hacker. You realize that understanding what makes hackers “tick” might be a good basis to set up intrusion prevention initiatives at your company.

The boss agrees, and asks you to create a presentation. It will include a typical hacker profile, the characteristics of ethical and unethical hackers, and recommendations in the areas of people, technology, and standards/policy, which can be used by the company to ensure the safety of its systems from internal as well as external threats.

When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.

1.7: Create neat and professional looking documents appropriate for the project or presentation.
2.1: Identify and clearly explain the issue, question, or problem under critical consideration.
6.3: Integrate the human aspect of cybersecurity into an organization’s cybersecurity policy.

Step 1: Review the Terry Childs Case
Before getting started on the presentation, you will want to first learn about the Terry Childs case. Research the case and write a one-page summary of your findings. Your summary should answer the following questions:

What led to Childs being charged with a crime?
How did his employer respond to his actions? What did it do right and/or wrong?
What could the company have done to better secure its assets?
Your summary should be thorough and include a references page. The information gathered will be used in your final presentation. You will use this summary as Appendix A to your presentation.

Submit the Terry Childs Case Review for feedback.

Step 2: Project Practice – SIMTRAY Firion: Day 1
Now that you have been introduced to an actual case of insider threats, you will practice handling insiders in a simulated environment. The world of cybersecurity is populated with diverse people with a diversity of perspectives. Every now and then, individuals may violate certain standards of behavior or ethics. It is in an organization’s best interest to identify these people and address their core issues, either through motivation, incentives, or by developing a strong relationship with them. In the event that this course of action fails, organizations must be prepared to employ graduated adverse personnel actions.

You will learn how to resolve issues and provide a secure environment by exploring the SIMTRAY titled, “Firion: Find Your Way in Three Days.” SIMTRAY is a simulation that presents you with scenarios that will provide insight into how information security management handles various issues. Some of the issues and topics addressed in this exercise include hacker profiles, insider threats, laws concerning privacy, anonymity – definition, and digital rights management.

The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need. Record your best score and at least one lesson learned from the exercise to include in your report at the end of the three-day simulation.

Step 3: Project Practice – SIMTRAY Firion: Day 2
In the previous step, you started to examine the SIMTRAY, “Firion: Find Your Way in Three Days.” In this step, continue to focus on SIMTRAY, but document the specific issues that you would like to include in your presentation. You may encounter the following topics in this exercise: hacker profiles, insider threats, laws concerning privacy, anonymity – definition, and digital rights management.

The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need. Record your best score and at least one lesson learned from the exercise to include in your report at the end of the three-day simulation.

Step 4: Project Practice – SIMTRAY Firion: Day 3
In this step, you should continue to explore the scenarios within SIMTRAY, “Firion: Find Your Way in Three Days.” If you have not already, you will most likely encounter the following topics in this exercise: hacker profiles, insider threats, laws concerning privacy, anonymity – definition, and digital rights management. Document specific issues that you experience in the exercise that you would like to include in your presentation. Think about how these issues might be addressed by guidelines and policy.

The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need. Compile your recorded scores, lessons learned, and documented industry issues into a one-page report. You will use this report as Appendix B to your presentation.

Submit your Firion Simtray Report for feedback.

Step 5: Psychological Factors
In the previous three steps, you completed simulation activities handling insiders. In the next few steps, you’ll examine intrusion motives / hacker psychology. In order to fully understand the Terry Childs case, it is important to understand that one’s internal motivations play a significant role in their actions.

Your next assignment will require you to create a Psychological Factor Matrix that summarizes types of hackers and actors, their motivations, and what sort of standards, policies, and guidelines would be most suitable to mitigate their impact. In order to prepare for this assignment, you will need to dig deeper into the psychological factors that affect hackers. Review the hacker psychology and sociological aspects resource on the hackers and actors topic page and document the following:

What psychological factors motivate hackers and actors (e.g., addiction, crime, greed, status)?
Give examples where these motivations were a factor in a cyberattack.
What can organizations do to be more proactive in identifying and addressing these threats?
While you do not need to submit your findings, they will be essential to the completion of your Profile Matrix in a later step.

Step 6: Hacking as an Addiction
After considering psychological factors of hackers and actors in the last step, you will expand your exploration into the concept of hacking as an addiction.

In examining the psychological factors of hackers, some mental health and criminal justice professionals contend that hacking is an “addiction” and causes obsessive, risk-taking behavior in a manner similar to illegal narcotics—hackers hack to “get high” from the thrill of breaking into a system and getting away with it. Examine and document your thoughts on the following questions:

Should policy makers look toward treatment, rather than incarceration, as to the disposition of hackers? Why or why not?
Think about this question in relation to the Childs case and how it will affect your recommendations.

Post your thoughts to the discussion board for feedback.

Step 7: Ethical vs. Unethical Hackers
As the cybersecurity field expands, the larger community discourse leads to changes in terminology. While some of our course materials may differentiate between the terms “hackers” and “crackers” as threat actors, we will use the terms “ethical hackers” and “nonethical hackers” to make the same differentiation. Learn about the different types of hackers, or non-state actors, and document the following:

How do the profiles for ethical and unethical hackers differ?
Should these psychological attributes make a difference as to the amount of, or nature of the punishment meted out to those who are caught? Why or why not?
Describe how certain factors can also motivate ethical hackers, or those who defend against cyberattacks? (e.g., revenge, patriotism, fear of government abuse, pride, respect for the law, ownership, anger, retaliation).
While you do not need to submit your findings, they will be essential to the completion of your matrix in a later step.

Step 8: Hacker Profiling
In the previous step, you learned about the psychological factors that motivate hackers. In this step, you will go a bit further by learning how to profile hackers — a skill that is essential to the success of cybersecurity professionals. Read about hacker profiling hackers and document the following:

How do profiles of ethical and unethical hackers differ?
While psychological profiling of criminals is not a new field, should we attempt to profile cybercriminals?
What sort of things do we already know about the personalities of cybercriminals?
Do we have enough evidence to indicate there is a distinct psychological pattern that would help in the apprehension of cybercriminals?
In the next step, you will use all the information you’ve learned about hackers to create a matrix.

Step 9: Define Standards, Policies, and Guidelines
Before you can complete the Profile Matrix and develop solutions for your company, you will need to take a closer look at how standards, policies, and guidelines affect a company’s security posture. You probably already have questions about what policies were in place prior to the Childs incident. In this step, you dig deeper and learn more about the difference between standards, policies, and guidelines by creating a two- to three-page comparison report. Your report should answer the following questions:

What is the difference between standards, policies, and guidelines?
How do they relate to one another?
How well do they work in securing networks and data within the organization?
This report is particularly important because it will affect the recommendations you make to your boss regarding the case. You will use this report as Appendix C to your presentation.

Submit your Standards, Policies, and Guidelines Definition for feedback.

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Wridemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order

Related Tags

Academic APA Writing College Course Discussion Management English Finance General Graduate History Information Justify Literature MLA