Cyber Security Awareness Assignment Help
Order ID# 45178248544XXTG457 Plagiarism Level: 0-0.5% Writer Classification: PhD competent Style: APA/MLA/Harvard/Chicago Delivery: Minimum 3 Hours Revision: Permitted Sources: 4-6 Course Level: Masters/University College Guarantee Status: 96-99%
Running Head: CYBERSECURITY AWARENESS 4
Title: Cyber Security Awareness
Cybersecurity awareness is one of the significant agendas organizations, business and companies are much focused on in the whole world. This is because security plays a big role in the determination of the profit, lose and also the growth of a business. Cybersecurity involves different stakeholders apart from the organization such as employees, partners, customers, and compliance agencies. For the Dayton organization to be secure and successful, it must come up with a way of making the people aware of the threats and also ways of maintaining security. For an organization to be secure and achieve all its goals and visions, it should be able to achieve the following first. Have a plan on how its employees should be trained about security principles. Make sure it has a backup of the most important information and data. Come up with a way of protecting network, computers and both information and data of the organization. And finally, the organization’s internet connection should be provided with firewall security (Vasileiou & Furnell, 2019).
For an organization to be secure, many people should be included to achieve effective cybersecurity. And the people to be involved should have security policies to guide them towards the organization’s mission of security. The policies should be established by the organization. Security policies are rules created so that authorized users can comply with them and the guidelines related to the security of the organization. Cybersecurity policies were established to influence and determine all the great decisions and actions in the organization. Policies in the organization they also protect the information infrastructure in cyberspace and respond to threats as well as minimization of damage from cyber incidents. And finally, the policies should provide enough management goals, responsibilities, data classification, and consequences (Powner, 2011).
The mission of an organization towards cybersecurity awareness is to come up with quality services and protection of information and data for both the organization and its customers. And to make sure that the security is created and maintained for both short and long term needs. Employees play a crucial role in making sure that an organization’s mission is achieved. Due to that, the organization is required to train the employees in security principles and procedures so that they can be able to help in terms of achieving the mission (Fields, 2018).
To implement a successful cybersecurity mission, the organization should be transparent to the extent of announcing and then posting guidelines and policies which the organization requires its employees and customers to follow. Posters are usually used to remind the targeted people in and out of the organization on the policies which they should follow. Through this way of posting the policies and guidelines, cybersecurity can be achieved more quickly in an organization (IBP, 2013).
For an organization to achieve successful cybersecurity, it must come up with a unique and effective strategy that will enable it to monitor every activity going on and enforce the security policies. The organization to achieve that, the leaders and the stakeholders should meet to ensure that the policies which have been put in place together with the procedures are doable. Then the organization should make sure that the policies and procedures for its customers have the best format so that they can be achievable and accessible. The organization should make sure that the policies and procedures have specific deadlines to be acknowledged. Finally, the organization should come up with consequences for anyone who fails to adhere to the policies and procedures within the required period. And also the organization should not bend the laws towards anyone despite his or her position in and out of the organization. This is to make sure that the policies and procedures are followed to the latter.And all those who fail are treated the same way according to the policies of the organization(Willson & Dalziel, 2015).
Fields, Z. (2018). Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution. Hershey, PA: IGI Global.
IBP, I. (2013). US National Cyber Security Strategy and Programs Handbook Volume 1 Strategic Information and Developments. Morrisville, NC: Lulu.com.
Powner, D. A. (2011). Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, But Sustained Leadership Is Needed. Collingdale, PA: DIANE Publishing.
Vasileiou, I., & Furnell, S. (2019). Cybersecurity Education for Awareness and Compliance. Hershey, PA: IGI Global.
Willson, D., & Dalziel, H. (2015). Cyber Security Awareness for Lawyers. Rockland, MA: Syngress.