Help with case study

[ad_1]
Scenario Welcome to Padgett-Beale! As a new management intern, your first rotation will be with the Training Team in the Office of Human Resources. T2, as they like to be known, is part of a collaborative effort to develop a robust internal training program for Padgett-Beale’s employees and managers. Your first assignment is to help develop a training module for security awareness. The training will be included in “first day” training for future employees and will also be presented as part of an on-going series of employee Lunch & Learn seminars offered by the Office of Human Resources. The topic for this training module will be “Digital Footprints and Asset Protection.” This topic was selected after several members of Padgett-Beale’s leadership team reviewed a program from the United Kingdom’s Centre for the Protection of National Infrastructure that is part of their “embedding security savvy behaviors online” campaign. (See https://www.cpni.gov.uk/my-digital-footprint and https://www.cpni.gov.uk/embedding-security-behaviour-change ) Your deliverable for this assignment will be a briefing paper that identifies and discusses five or more major issues that employees need to be aware of about this topic (Digital Footprints and Asset Protection). After you identify and describe each issue, include two to three additional points that employees should know. Try to keep a neutral tone, that is, you should include items that represent both the benefits and the drawbacks of a digital footprint. You should also address the importance of protecting both personal and company owned digital assets that are part of a digital footprint. See the instructions below for additional information about length, formatting, and citing of sources. Research Review the Week 1 and 2 readings. Research the term “digital footprint.” Here are some resources to help you get started:https://www.internetsociety.org/your-digital-footprint-matters (there are nine video tutorials on this page)http://blog.trendmicro.com/the-importance-of-understanding-your-digital-footprint/ https://cyberbullying.org/the-importance-of-your-digital-reputation https://memeburn.com/2013/06/your-digital-footprint-is-important-heres-how-to-grow-it/ https://www.envision-creative.com/why-your-digital-footprint-is-your-best-salesman/ Review three or more items in CPNI employee awareness campaign https://www.cpni.gov.uk/my-digital-footprint and https://www.cpni.gov.uk/embedding-security-behaviour-changeResearch additional ownership, privacy, and security issues associated with a digital footprint.https://us.norton.com/internetsecurity-privacy-clean-up-online-digital-footprint.htmlhttp://thewiseinvestorgroup.com/Wise-Investor-Files/Public/PDF_Files/Featured-Articles/YourDigitalLifeasPartofyourEstatePlan2.pdf https://efinplan.com/estate-planning-for-your-digital-footprint/ Find at least one additional source which provides information an employee can use to better protect their own digital assets (the things that contribute to your digital footprint) loss or harm. Write Write a 2 page briefing paper (single spaces minimum 1000 word count) in which you present a summary of your research about the topic and your recommendations as to what should be included in the training module. Be choosy about what you include – the total training time available will be 30 minutes. Don’t be too choosy however. Your recommended content should be comprehensive and fully address the training topic. At a minimum, your briefing paper for this case study must include the following: 1.An introduction to the case scenario and the topic (use the information above) 2.A discussion of five or more key points about the topic (“security and privacy issues”) 3.Recommendations for 5 or more actions that managers and employees should take to address the identified security and privacy issues. 4.A closing section in which you restate the key issues and your recommendations. As you write your briefing paper, make sure that you address security issues using standard terms and definitions. See the resources listed under Week 1 and under Course Resources > Cybersecurity Concepts for definitions and terminology. Submit For Grading Submit your research paper in MS Word format (.docx or .doc file) using the Case Study #1 Assignment in your assignment folder. (Attach your file to the assignment entry.) Additional Information To save you time, a set of appropriate resources / reference materials has been included as part of this assignment. You must incorporate at least three of these resources into your final deliverable. You must also include one resource that you found on your own.Your briefing paper should use standard terms and definitions for cybersecurity. See Course Content > Cybersecurity Concepts for recommended resources. 3.You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s minimum page count. (An example and template file are available in the LEO classroom. See CSIA_Basic_Paper_Template(APA_6ed,Nov2014).docx file under Content > Course Resources.) 4.Your briefing paper should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings to organize your paper. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,Nov2014).docx. 5.You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. 6.You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA). 7. You are expected to follow the Rubrics assesment for grading criteria.
[ad_2]Source link
 
“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but splendidwritings.com proved they are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 14***| Rating: ⭐⭐⭐⭐⭐
"The company has some nice prices and good content. I ordered a term paper here and got a very good one. I'll keep ordering from this website."

"Order a Custom Paper on Similar Assignment! No Plagiarism! Enjoy 20% Discount"