About this Assignment:
Cybersecurity describes the protection of sensitive data, specifically data that is accessed or stored via the Internet. It is critical to understand types of cyber threats and how to prepare for these threats.
In this assignment, you will step into the role of a cybersecurity analyst at a start-up company. You must write a report describing potential threats and recommend a policy to defend against them.
Scenario:
You are a new security analyst for a start-up company that conducts all of their business online. The company’s CEO has asked you to prepare a detailed report on cybersecurity threats to your company, including an analysis of possible threats and a draft of a computer security policy.
Your paper should be between 1,250 and 1,500 words, excluding headings and reference pages. You should include a clear and concise summary outlining the security threats and the objectives of the security policy.
Company Details:
-There are 20 employees who work in an office, 5 employees who work remotely, and 10 contractors who work remotely.
-Your company maintains a database of 5,000 users with personal account information including full name, email address, mailing address, and phone number.
Part 1: Threats
Identify, define, and analyze 5 to 7 cybersecurity threats that could affect the company. Compare and contrast these threats. Provide examples of these threats with real-world examples, citing relevant evidence for them.
Part 2: Security Policy
Develop a draft cybersecurity policy for the company. Your policy should describe how it will defend against the threats identified in part 1. Be sure to incorporate references and evidence in this section as well. Identify the people, process and technology that stand to be impacted.
Formatting & Sources:
While you should provide peer-reviewed, academic sources, the following lessons from this course may be helpful when completing this assignment: What is Computer Security? – Definition & Basics, Types of Computer Security, Computer Security Policies Examples, What is Phishing? – Definition, Examples & Awareness