Cybersecurity Planning And Managementcreating Company E Mailwifiinte ✓ Solved

Cybersecurity Planning and Management Creating Company E-mail/WIFI/Internet Use Policies You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company. There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company. Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable). 1. Overview 2.

Purpose 3. Scope 4. Policy 5. Policy Compliance 6. Related Standards, Policies and Processes 7.

Definitions and Terms Some useful links and resources for your research: Assessment Information Subject Code: BUS606 Subject Name: Business Research Proposal Topic Selection, Justification and Presentation Assessment Title: Assessment 1 – Individual Presentation Weighting: 15 % Total Marks: Length: 15 Minimum of 10 slides (+- 10%) Due Date: Submission due Week 6– Sunday at 11.59 pm COURSE: Master of Business (Research) Unit: Business Research Proposal and Literature Review Unit Code: BUS606 Type of Assessment: Assessment 1 – Individual Presentation Unit Learning Outcomes addressed: (a) Demonstrate an advanced ability to identify, assimilate, and review applications of, particular research techniques. (b) Identify various means of data collection that are feasible and can be ethically enacted. (c) Articulate and critically evaluate differences between alternative research methodologies. (d) Explain how research outcomes may be affected by the nature and application of particular research techniques. (e) Demonstrate an advanced ability to construct a robust methodology for addressing a research question. (f) Explain how the use of selected methodologies is relevant to a specific research proposal.

Criteria for Assessment: ï‚· Understanding of the proposed project ï‚· Evidence of analysis ï‚· Organisation and use of visual aids ï‚· Non-verbal & verbal communication skills Assessment Task: Students are to select their proposed research topic for the Master of Business Research thesis and make a presentation to the class for at least 10 minutes followed by question and answer. The presentation is required to use PowerPoint slides. Submission Date: Week 6– Sunday at 11.59 pm (online submission) of the PowerPoint presentation slide deck. Total Mark & Weighting: 15 marks | 15% Students are advised that any submissions past the due date without an approved extension or approved extenuating circumstances incur a 5% penalty per calendar day, calculated from the total mark e.g. a task marked out of 15 will incur a 1.75 mark penalty per calendar day.

Assessment 1– Individual Presentation. Presentations will be made during the scheduled class time. Assessment Description Students are required to select a proposed research topic for their Master of Business Research thesis that is aligned to one of the seven Research Clusters in the School of Business as listed below. Students are required to make a presentation for 10 minutes to the class on their proposed research topic and answer questions from the class and the lecturer. Students must conduct extensive research on the topic and must cite relevant sources to support their research proposal.

The MBR Research Clusters are: ï‚· Cluster 1: Leadership and Management of Large Corporations ï‚· Cluster 2: Leadership and Management of Not-for Profit Organisations ï‚· Cluster 3: Leadership and Management of Start-ups, SMEs and Family Business ï‚· Cluster 4: Leadership and Management of Technological and Digital Transformation ï‚· Cluster 5: Leadership and Management of Sustainable Business Operations ï‚· Cluster 6: Leadership and Management of Government and Multilateral Organisations ï‚· Cluster 7: Leadership and Management of Tourism and Hospitality Organisations The PPT presentation should address at a minimum the following points: 1. The proposed title of the research project (maximum 12 words) 2.

The Research Cluster of the project 3. The research objective 4. The motivation for conducting the research 5. A justification of the importance and significance of the research project 6. An overview of the relevant literature and prior research concerning the proposed research project 7.

The proposed method for collecting data and other evidence when executing the research project 8. Discussion of expected challenges and proposed solutions to these challenges when conducting the research 9. The expected contribution to the field of knowledge from undertaking the research 10. Reference list comprising a minimum of 10 references Presentation requirements: • A PowerPoint presentation in class with a minimum of 10 slides • The PowerPoint presentation must go for a minimum of 10 minutes. Please allow an additional 5 minutes for questions time if requested by your lecturer or other students in the class. • Your PPT should be converted into PDF and uploaded via Turnitin on the Sunday of the Presentation week. • Appropriate and accurate use of the APA referencing system for in-text citation as well as a reference list You must use a minimum of 10 references.

These must be authoritative and comprise of primarily academic references (e.g. journal article or textbook) or other authoritative sources such as government reports. Criteria HD (High Distinction) 85%-100% DN (Distinction) 75%-84% CR (Credit) 74%-65% P (Pass) 50%-64% F (Fail) 0%-49% Understanding of the project 3 marks Builds a convincing argument showing how all key points are integrated together Uses examples to elaborate on the key points and theory Builds a convincing argument showing how key issues, analysis, and recommendations are integrated together Includes all issues, analysis and recommendations but with little elaboration Not integrated with theory or are not justified Includes some issues but analysis glossed over Team seemed uncomfortable to go beyond key facts.

Key points left out No grasp of issues that faced the client. Over-reliance on notes Evidence of analysis 5 marks Able to use references to back up claims and recommendations made Recommendations clearly come from the analysis of the project. Evidence of extensive research and analysis: journals, prescribed text, other books, verified websites, primary research Used references to justify analysis Background research and analysis of this is clearly identifiable Steps used are shown and some rationale for the development of recommendations provided Steps used in the analysis shown but little justification why or how these are used to develop recommendations No references to any sources Suggestions/recommendations just seem to appear.

Organisation and Use of visual aids 5 marks Ideas are clearly organised so audience can follow easily. The purpose of the presentation is clear in all stages and there is a seamless transition between speakers. Graphics and text are well integrated into the presentation. The text is appropriate for the content and room size. Visual presentation complements rather than dominates presentation Main ideas are presented in a logical manner.

Flow of presentation is smooth between speakers. Shows that the group has worked collaboratively Text clearly summarises the key points. Graphics and text do not distract attention from the speaker or content. Use of visual aids is consistent across the entire presentation. Main ideas are presented in a logical manner.

Flow of presentation may be awkward. Group members demonstrate that they have worked on the presentation as a whole. All group members take an equal share in presentation. Group uses graphics but often differs from a verbal presentation. Not summarised so presenters end up reading off-board.

Differing styles with differing speakers. Ideas are not focused. Audience may have difficulty following argument. Main points are difficult to identify. There is no transition between key points.

There is an awkward transition between speakers. Presentation appears to be done by individuals rather than group. Group uses graphics but is not supported by text or presentation. Text is too dense – too much info on a slide. Differing styles with differing speakers No structure to the presentation Audience cannot follow sequence No introduction or conclusion Apparent that group is not working well together Group members missing (without valid reason) or not contributing Presents content with no PowerPoint or overhead slides Non-verbal & Verbal delivery 2 marks Constantly looks at audience Shows enthusiasm for their work and how this will help the client All group members use a clear voice and correct, precise pronunciation of terms so that all audience members can hear Acts in a very professional manner Generally, presenter looks at audience during presentation Shows expression consistent with presentation Uses gestures to point out or highlight presentation materials All voices are clear Occasionally looks at audience during presentation Voice is generally clear Generally, speaks directly to the audience Some reading off the board Some group members difficult to understand because of rushed speech Only focuses attention on one particular part of the audience, does not scan the audience Voice is low Constantly talks to the board, not the audience Some use of filler words Audience members have difficulty hearing Does not attempt to look at the audience at all, reads notes the entire time Distracting gestures (fidgeting) while presenting or waiting to present Excessive use of filler words (e.g. um, er, ah, like) Use of offensive language Use of slang Total marks

Paper for above instructions

Cybersecurity Planning and Management Policies: Email and Wi-Fi/Internet Use


Email Policy


1. Overview
In an era where digital communication is paramount, establishing a robust email policy is essential to protect the integrity, confidentiality, and availability of our company's information systems. Given the sensitive nature of financial services, it becomes even more critical to delineate acceptable email behaviors.
2. Purpose
The purpose of this policy is to govern the use of the company's email system by employees to mitigate the risk of data breaches, ensure compliance with legal and regulatory frameworks, and protect the company’s resources from misuse.
3. Scope
This policy applies to all employees, contractors, and third-party users of the company's email system. It encompasses all forms of communication conducted through the company’s email accounts.
4. Policy
- Personal Use: Employees are permitted to use company email for limited personal communication. However, such usage must not interfere with work responsibilities or violate any company policies.
- Prohibited Activities: Employees must not engage in activities deemed inappropriate, including but not limited to: sending or receiving offensive materials, spam, chain letters, or any illegal content. Additionally, accessing external email accounts (e.g., Gmail, Yahoo) for non-business purposes is forbidden within company premises.
- Confidentiality: Employees must treat all company information as confidential. Sensitive data should not be discussed over email without encryption or appropriate security measures.
- Monitoring and Privacy: Employees should be aware that company emails may be monitored for compliance with this policy and all other company policies. Personal emails should be kept to a minimum as they are subject to the same monitoring.
- Data Retention: Emails containing important information should be archived according to the company's data retention policy, with the requirement to delete or transfer less critical emails after a specified timeframe.
5. Policy Compliance
Non-compliance with this policy will result in disciplinary action, which may include termination of employment or legal measures. Employees are encouraged to report breaches of this policy to their supervisor or the IT department.
6. Related Standards, Policies, and Processes
This policy should be read in conjunction with the company's Data Protection Policy, Acceptable Use Policy, and any relevant regulatory compliance guidelines, such as the Gramm-Leach-Bliley Act or the Sarbanes-Oxley Act.
7. Definitions and Terms
- Confidentiality: The principle that sensitive data should be accessible only to individuals authorized to have access.
- Spam: Irrelevant or unsolicited messages sent over the internet, typically to a large number of users.
- Email Archiving: The process of storing information contained in email messages for future reference or legal compliance.
---

Wi-Fi and Internet Use Policy


1. Overview
Wi-Fi and internet access are crucial for efficient daily operations, yet these resources can expose the company to multiple cybersecurity threats. This policy outlines appropriate use and establishes measures to counter potential risks.
2. Purpose
The purpose of this policy is to ensure the responsible use of the company’s internet and Wi-Fi resources while protecting sensitive information, minimizing legal risks, and ensuring compliance with applicable laws and regulations.
3. Scope
This policy applies to all employees, contractors, and authorized third-party users who access company networks and the internet from company facilities or devices.
4. Policy
- Acceptable Use: Employees must use the company's Wi-Fi and internet access primarily for business purposes. Limited personal use is permissible as long as it does not interfere with work commitments or violate company policies.
- Prohibited Uses: Activities such as downloading or streaming copyrighted materials without permission, visiting inappropriate or illegal websites, and engaging in peer-to-peer file sharing are strictly prohibited.
- Device Security: Employees are responsible for ensuring that all devices connected to the company's network, including personal devices, have up-to-date antivirus software and are secured against unauthorized access.
- Use of VPN: All remote workers must utilize a Virtual Private Network (VPN) when accessing the company’s network from off-site locations to protect sensitive data.
- Guest Access: Guest access to the company Wi-Fi should be controlled through a separate network with limited access rights. Guests should be monitored, and access should terminate after specified periods.
5. Policy Compliance
Failure to comply with this policy may lead to disciplinary actions, including termination of employment. Violations that result in cybersecurity incidents may also result in legal action.
6. Related Standards, Policies, and Processes
Employees should familiarize themselves with the company’s IT Security Policy, Mobile Device Policy, and any relevant regulatory compliance standards related to internet safety (e.g., the Federal Information Security Management Act).
7. Definitions and Terms
- VPN (Virtual Private Network): A secure network connection that encrypts data transmitted over the internet, protecting sensitive information from interception.
- Cybersecurity Threat: Any potential occurrence that may compromise the confidentiality, integrity, or availability of information or services.
---

Conclusion


The outlined email and Wi-Fi/internet use policies aim to strike a balance between enabling operational effectiveness and safeguarding the company’s digital assets. It is essential that all employees familiarize themselves with these policies and integrate best practices into their daily routines, fostering a culture of cybersecurity within the company.

References


1. Whitman, M. E., & Mattord, H. J. (2023). Principles of Information Security. Cengage Learning.
2. Stallings, W. (2022). Network Security Essentials: Applications and Standards. Pearson.
3. Ashley, C. (2020). "The Importance of Email Security in Financial Services". Journal of Cybersecurity, 8(2), 88-99.
4. National Institute of Standards and Technology (NIST). (2021). Framework for Improving Critical Infrastructure Cybersecurity.
5. SANS Institute. (2023). "Best Practices for Email Security in Professional Environments".
6. Verizon. (2023). 2023 Data Breach Investigations Report.
7. CISA. (2022). "Cybersecurity Best Practices for Internet Usage".
8. O'Reilly, S. (2021). "Understanding the Risks Associated with Public Wi-Fi". Cybersecurity Journal, 10(3), 34-45.
9. Federal Trade Commission (FTC). (2023). Protecting Personal Information: A Guide for Business.
10. Smith, R. & Kossler, D. (2020). Cybersecurity for Business Professionals. Wiley.
By ensuring that these policies are clear, concise, and accessible, organizations can not only protect themselves from compliance risks but also enhance operational efficiencies through improved staff adherence to safe cyber practices.