Free Samples
COMMGMT 2509 Policies And Procedures In Organisational Cyber Security
.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}
COMMGMT 2509 Policies And Procedures In Organisational Cyber Security
0 Download5 Pages / 1,045 Words
Course Code: COMMGMT 2509
University: The University Of Adelaide
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Question:
The Process Creating an annotated bibliography calls for the application of a variety of intellectual skills: concise exposition, succinct analysis, and informed library research. First, locate and record citations to books, periodicals, and documents that may contain useful information and ideas on your topic. Briefly examine and review the actual items. Then choose those works that provide a variety of perspectives on your topic. You may have to quickly review many works before you find good ones. Annotate at least four of these. The length of the annotation will depend on why it has been included and on the source itself. Cite the book, article, or document, including the abstract. Write a concise annotation that summarises the central theme and scope of the book or article. Include one or more sentences thatEvaluate the authority or background of the author,Comment on the intended audienceCompare or contrast this work with another you have cited, orExplain how this work illuminates your bibliography topic.
Answer:
Introduction
Information security is a practise that is used to prevent unauthorised user to access the data. It make sure that confidentiality, integrity and availability of data. The information security can be achieved by using antivirus software, firewall, encryption software and training standards. In this few articles related to information security awareness that says that various laws and regulations are used so that they can access the data, process and store in a way that they are secure. All the information awareness policy that is used makes sure that confidentiality, integrity and availability is met. Information security awareness policy is used so that employees become aware about the security threats. Information security awareness policies are used so that risk management could be handled. Information security states that data should be encrypted so that even in case of leakage data is not leaked. It is also suggested that data signatures should be used so that authentication is met.
Information Security Awareness Policy
The article that is referred is “Information Security Awareness at the Knowledge-Based Institution”, written by Abdul Rahman Ahlan and Muharman Lubis. In this article author stated that that security awareness policies are needed in every organisation so that negative effects could be encountered. Various security solutions are suggested like use of strong passwords to access the computer. In the article it was suggested that software should be kept up to date so that viruses are not penetrated into the system. It is also mentioned in the article that file sharing should be avoided as it adds risk to the computer system. The sensitive information should be encrypted so that even if the files are leaked the information is not accessed by anyone. Information security awareness policy states that proper access control list should be defined so that only valid and authenticated uses are able to access the information. In this article findings are useful as they encourage stakeholders and employees to understand information security policy behaviour. Information security threats are increasing due to which security breaches are increasing. Thus, information security procedures are listed so that data could be protected from all the malicious attacks.
at is analysed is “Information security awareness” written by northern Arizona University. In this article author stated that awareness should be spread by training session so all the employees become aware about the malwares that are present. It is important to do as it was recently seen that employees are not aware about the malwares. The reason of this policy is to make sure that all the authorised users have the understanding about the security threats and risks. It is recommended by the author that this policy must be used to secure the information. If comparing the suggestion with the author of the above article. It is found in this article author states that users should become aware first and in the above article some of the ways are offered through which data could be secured. The policy in the article states that information security training should be developed so that current threats and emerging threats could be resolved. Author states that prevention should be taken regarding all the malicious activities so that information remains protected.
The third article that is analysed is “An effective method for information security awareness raising initiatives” written by AliMaqousi1, TatianaBalikhina and Michael Mackay. In this article author proposed various ways through which information security awareness could be introduced. Apart from that they offered the threats that exist in the system so that users can become aware about the IT threats. Then they are trained so that they can use the knowledge to mitigate from the threats. The information security awareness program was developed by the author that covers various steps; the first stage is analysis stage that identifies the security concerns and the second stage is implementation stage that spreads the awareness and then future designs maintain plan. In this paper, security awareness programs that are needed by an organisation are discussed. The security culture can be created by increasing the user awareness by making use of strong password. The author suggested that a security awareness team should be kept that keep employees updated about all the security threats and vulnerabilities. This paper addresses the need of security awareness in an organisation. It makes sure that user become aware about the security concerns so that they can maintain privacy of information.
It is clearly said that security polices and procedure are important and every employee should receive security awareness training so that attacks could be mitigated. It suggested that every business should offer security awareness training in an organisation. It is important to educate the staff so that they can handle the entire situation and sensitive information could be protected. The security awareness program covers the best way through which information breaches could be avoided, the author suggested that information and sensitive data should be backed up so that it case of failure data could be recovered easily. Business continuity management plan is defined so that even in case of failure information could be recovered.
Conclusion
It can be concluded from the first article that data should be encrypted so that it can be accessed only by valid user and others are not able to access the information. It makes sure that security breaches are reduced. The other article recommended that training sessions should be there in an organisation so that staffs become aware about the threats and risk. Apart from that, in eth other article author suggested that access control list should be maintained so that only valid users are able to access the information.
References
Lubis, A. and Lubis, M. (2017). Information Security Awareness at the Knowledge-Based Institution: Its Antecedents and Measures. Available from https://www.sciencedirect.com/science/article/pii/S1877050915036121 Accessed on 14 oct 21018
Northern university, A. (2017). INFORMATION SECURITY AWARENESS TRAINING. Available from https://nau.edu/university-policy-library/wp-content/uploads/sites/26/Information-Security-Awareness-Training.pdf Accessed on 14 oct 21018.
Mackay, M. and Balikhina, T. (2017). AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES. Available from https://airccse.org/journal/jcsit/5213ijcsit06.pdf Accessed on 14 oct 21018.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Auerbach Publications.
Free Membership to World’s Largest Sample Bank
To View this & another 50000+ free samples. Please put
your valid email id.
Yes, alert me for offers and important updates
Submit
Download Sample Now
Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.
UploadUnique Document
DocumentUnder Evaluation
Get Moneyinto Your Wallet
Total 5 pages
PAY 3 USD TO DOWNLOAD
*The content must not be available online or in our existing Database to qualify as
unique.
Cite This Work
To export a reference to this article please select a referencing stye below:
APA
MLA
Harvard
OSCOLA
Vancouver
My Assignment Help. (2021). Policies And Procedures In Organisational Cyber Security. Retrieved from https://myassignmenthelp.com/free-samples/commgmt-2509-policies-and-procedures-in-organisational-cyber-security/malicious-software-protection-policy.html.
“Policies And Procedures In Organisational Cyber Security.” My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/commgmt-2509-policies-and-procedures-in-organisational-cyber-security/malicious-software-protection-policy.html.
My Assignment Help (2021) Policies And Procedures In Organisational Cyber Security [Online]. Available from: https://myassignmenthelp.com/free-samples/commgmt-2509-policies-and-procedures-in-organisational-cyber-security/malicious-software-protection-policy.html[Accessed 18 December 2021].
My Assignment Help. ‘Policies And Procedures In Organisational Cyber Security’ (My Assignment Help, 2021)
My Assignment Help. Policies And Procedures In Organisational Cyber Security [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/commgmt-2509-policies-and-procedures-in-organisational-cyber-security/malicious-software-protection-policy.html.
×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}
×
Thank you for your interest
The respective sample has been mail to your register email id
×
CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.
Account created successfully!
We have sent login details on your registered email.
User:
Password:
Are you having trouble writing your pending college essay? It’s true that the college essay format can be a bit different than what you have followed in school. If you want to get the right guidance on writing papers for college curriculum, hire writers from MyAssignmenthelp.com. They are flexible in writing on any essay topic. You can use this solution as a proper specimen on how to write a college essay.
Latest Management Samples
div#loaddata .card img {max-width: 100%;
}
MPM755 Building Success In Commerce
Download :
0 | Pages :
9
Course Code: MPM755
University: Deakin University
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answers:
Introduction
The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…
Read
More
SNM660 Evidence Based Practice
Download :
0 | Pages :
8
Course Code: SNM660
University: The University Of Sheffield
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: United Kingdom
Answers:
Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Read
More
Tags:
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration
BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :
20
Course Code: BSBHRM513
University: Tafe NSW
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answer:
Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…
Read
More
MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :
5
Course Code: MKT2031
University: University Of Northampton
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: United Kingdom
Answer:
Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Read
More
Tags:
Turkey Istanbul Management University of Employee Masters in Business Administration
MN506 System Management
Download :
0 | Pages :
7
Course Code: MN506
University: Melbourne Institute Of Technology
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answer:
Introduction
An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Read
More
Tags:
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology
Next