Cybersecurity Task2

Overview: For the final project in this course you will assume the role of a training manager at a cybersecurity firm needing to create a training manual for new
information security analyst hires. For milestone two, complete the cybersecurity policy section of the manual. Remember, use the same manual you used to
complete milestone one.
Prompt: You will submit the cybersecurity policy section of the training manual. The training manual will include a discussion of the purpose and value of
cybersecurity, illuminate core tenets of cybersecurity, and illustrate best practices for addressing common threat scenarios. Use the information on each of
these topics to develop a customized training manual for newly hired cybersecurity professionals at CyberLeet.
Specifically, the following critical elements must be addressed:
I. How to Develop Cybersecurity Policies: In this part of the training manual, you will develop the cybersecurity policies in four distinct areas for new hires
at CyberLeet. Based on information you have learned on cybersecurity use and governance, you will develop policies for end‐user passwords, acceptable
use, basic users, and user training. For each of these areas, follow the guiding questions to develop effective use policies that new hires will be trained
on. Review the directions in each section of the manual template to guide your response. Be sure you delete all of the directions in each section prior to
finalizing the information.
A. What principles should the information security analyst apply in order to develop appropriate password policies for their clients? Make sure you
address confidentiality, integrity, and availability of information.
B. What principles should the information security analyst apply in order to develop appropriate acceptable use policies for the client? Make sure
you address confidentiality, integrity, and availability of information.
C. What principles should the information security analyst apply in order to develop appropriate user training policies for the client? Make sure
you address confidentiality, integrity, and availability of information.
D. What principles should the information security analyst apply in order to develop appropriate basic user policies for the client? Make sure you
address confidentiality, integrity, and availability of information.
Rubric
Guidelines for Submission: Use the template provided to complete this assignment. Review each section and follow the prompts accordingly. All prompts should
be deleted. Remember, you are responsible for every section of a completed training manual.
Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
How To:
Password Policies
Meets “Proficient” criteria and
demonstrates keen insight into
best practices for defending the
confidentiality, integrity, and
availability of information
Identifies specific principles for
developing appropriate password
policies that address
confidentiality, integrity, and
availability of information
Identifies principles for developing
password policies but fails to fully
address all relevant aspects or
there are gaps in logic or accuracy
Does not identify principles for
developing password policies
25
How To:
Acceptable Use
Policies
Meets “Proficient” criteria and
demonstrates keen insight into
best practices for defending the
confidentiality, integrity, and
availability of information
Identifies specific principles for
developing appropriate acceptable
use policies that address
confidentiality, integrity, and
availability of information
Identifies principlesfor developing
acceptable use policies but fails to
fully address allrelevant aspects or
there are gapsin logic or accuracy
Does not identify principles for
developing acceptable use policies
25
How To: User
Training Policies
Meets “Proficient” criteria and
demonstrates keen insight into
best practices for defending the
confidentiality, integrity, and
availability of information
Identifies specific principles for
developing appropriate user
training policies that address
confidentiality, integrity, and
availability of information
Identifies principles for developing
user training policies but fails to
fully address all relevant aspects or
there are gaps in logic or accuracy
Does not identify principles for
developing user training policies
25
How To: Basic
User Policies
Meets “Proficient” criteria and
demonstrates keen insight into
best practices for defending the
confidentiality, integrity, and
availability of information
Identifies specific principles for
developing appropriate basic user
policies that address
confidentiality, integrity, and
availability of information
Identifies principles for developing
basic user policies but fails to fully
address all relevant aspects or
there are gaps in logic or accuracy
Does not identify principles for
developing basic user policies
25
Total 100%

Calculate your order
275 words
Total price: $0.00

Top-quality papers guaranteed

54

100% original papers

We sell only unique pieces of writing completed according to your demands.

54

Confidential service

We use security encryption to keep your personal data protected.

54

Money-back guarantee

We can give your money back if something goes wrong with your order.

Enjoy the free features we offer to everyone

  1. Title page

    Get a free title page formatted according to the specifics of your particular style.

  2. Custom formatting

    Request us to use APA, MLA, Harvard, Chicago, or any other style for your essay.

  3. Bibliography page

    Don’t pay extra for a list of references that perfectly fits your academic needs.

  4. 24/7 support assistance

    Ask us a question anytime you need to—we don’t charge extra for supporting you!

Calculate how much your essay costs

Type of paper
Academic level
Deadline
550 words

How to place an order

  • Choose the number of pages, your academic level, and deadline
  • Push the orange button
  • Give instructions for your paper
  • Pay with PayPal or a credit card
  • Track the progress of your order
  • Approve and enjoy your custom paper

Ask experts to write you a cheap essay of excellent quality

Place an order