Hits: 0
Organizational Cybersecurity Threat policy
The remote workplace infrastructure represents another challenge for cybersecurity professionals. Security policies have to be adjusted to accommodate remote workers such that cyber policies and principles are applicable.
Research remote workspace policies.
Design a 7-10-minute presentation of 15-20 slides for upper management who dont know much about IT that focus on cybersecurity issues related to remote work.
Use the following bullet points
-Describe eight security failures.
-Relate the security failures to the principles of cybersecurity (CIA triad).
-Explain specific design principles that have been violated. Organizational Cybersecurity Threat policy Help
-Recommend the design principles needed for remote workers.
-Title slide and reference slide.
-Include graphics/charts or design
-Support your presentation with a minimum of three scholarly resources.
19) In your own words, what do you understand by exception management.
Discuss why this type of management is both required and risky if improperly used by your technical managers.
Provide a real-world example to support your ideas.
20)Describe a Disaster Recovery Plan (DRP) including why it is an important function within IT and how it could be used.
Explain how a DRP differs from a BCP(Business Continuity Plan).
Describe three key points that would be covered in a DRP that would not be included within a BCP.
21)patching is the set of changes conducted to a server or system in order to improve, update, shore up security vulnerabilities, and remove bugs. This action, usually put forward by the vendor, is often automatic in client operating systems. Organizational Cybersecurity Threat policy Help
Create a patch management policy. The 250-750-word policy must include the following:
a)Quality Assurance Plan:
Be clear and concise, utilize position title, and provide detailed instructions on requirements.
b)Frequency:
Include events, timelines, and management requirements.
c)Rollback Procedure:
Include a timeline, notifications, and supporting departments.
d)Authorizing Authority:
Identify at least two levels up and include organizational notification requirements.
e)Time of Day:
Identify maintenance window and exceptions to the policy.
f)Summary:
identify patching.
For Organizational Cybersecurity Threat policy Help please click here