The writer is very fast, professional and responded to the review request fast also. Thank you.
Case Study #1: Digital Footprints and Asset Protection
Scenario
Welcome to Padgett-Beale! As a new management intern, your first rotation will be with the Training Team in the Office of Human Resources. T2, as they like to be known, is part of a collaborative effort to develop a robust internal training program for Padgett-Beale’s employees and managers. Your first assignment is to help develop a training module for security awareness. The training will be included in “first day” training for future employees and will also be presented as part of an on-going series of employee Lunch & Learn seminars offered by the Office of Human Resources.
The topic for this training module will be “Digital Footprints and Asset Protection.” This topic was selected after several members of Padgett-Beale’s leadership team reviewed a program from the United Kingdom’s Centre for the Protection of National Infrastructure that is part of their “embedding security savvy behaviors online” campaign. (See https://www.cpni.gov.uk/my-digital-footprint and https://www.cpni.gov.uk/embedding-security-behaviour-change )
Your deliverable for this assignment will be a briefing paper that identifies and discusses five or more major issues that employees need to be aware of about this topic (Digital Footprints and Asset Protection). After you identify and describe each issue, include two to three additional points that employees should know. Try to keep a neutral tone, that is, you should include items that represent both the benefits and the drawbacks of a digital footprint. You should also address the importance of protecting both personal and company owned digital assets that are part of a digital footprint. See the instructions below for additional information about length, formatting, and citing of sources.
Research
1. Review the Week 1 and 2 readings.
2. Research the term “digital footprint.” Here are some resources to help you get started:
a. https://www.internetsociety.org/your-digital-footprint-matters (there are nine video tutorials on this page)
b. http://blog.trendmicro.com/the-importance-of-understanding-your-digital-footprint/
c. https://cyberbullying.org/the-importance-of-your-digital-reputation
d. https://memeburn.com/2013/06/your-digital-footprint-is-important-heres-how-to-grow-it/
e. https://www.envision-creative.com/why-your-digital-footprint-is-your-best-salesman/
3. Review three or more items in CPNI employee awareness campaign https://www.cpni.gov.uk/my-digital-footprint and https://www.cpni.gov.uk/embedding-security-behaviour-change
4. Research additional ownership, privacy, and security issues associated with a digital footprint.
a. https://us.norton.com/internetsecurity-privacy-clean-up-online-digital-footprint.html
c. https://efinplan.com/estate-planning-for-your-digital-footprint/
5. Find at least one additional source which provides information an employee can use to better protect their own digital assets (the things that contribute to your digital footprint) loss or harm.
Write
Write a 2 page briefing paper in which you present a summary of your research about the topic and your recommendations as to what should be included in the training module. Be choosy about what you include – the total training time available will be 30 minutes. Don’t be too choosy however. Your recommended content should be comprehensive and fully address the training topic.
At a minimum, your briefing paper for this case study must include the following:
1. An introduction to the case scenario and the topic (use the information above)
2. A discussion of five or more key points about the topic (“security and privacy issues”)
3. Recommendations for 5 or more actions that managers and employees should take to address the identified security and privacy issues.
4. A closing section in which you restate the key issues and your recommendations.
As you write your briefing paper, make sure that you address security issues using standard terms and definitions. See the resources listed under Week 1 and under Course Resources > Cybersecurity Concepts for definitions and terminology.
Submit For Grading
Submit your research paper in MS Word format (.docx or .doc file) using the Case Study #1 Assignment in your assignment folder. (Attach your file to the assignment entry.)
Additional Information
1. To save you time, a set of appropriate resources / reference materials has been included as part of this assignment. You must incorporate at least three of these resources into your final deliverable. You must also include one resource that you found on your own.
2. Your briefing paper should use standard terms and definitions for cybersecurity. See Course Content > Cybersecurity Concepts for recommended resources.
3. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s minimum page count. (An example and template file are available in the LEO classroom. See CSIA_Basic_Paper_Template(APA_6ed,Nov2014).docx file under Content > Course Resources.)
4. Your briefing paper should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings to organize your paper. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,Nov2014).docx.
5. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.
6. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more