SlideShare a Scribd company logo
1 of 3
Security Awareness Report:
An
individual
assessment in the form of a business report.
Using the organisation, context and risk profile documented in
Continuous Assessment 1 (attached as Continuous assessment 1
word file), write a report detailing the approach you would take
to designing, developing and implementing an effective security
awareness program for this organisation, based on the following
scenario:
Your organisation has identified that its people are their best
line of defence against the rising threat of cyber-attacks.
As the Cyber Security Manager, you have been tasked with
developing an ongoing program of security awareness. The key
objective is to change the behaviour of all employees to be
aware of the various cyber threats and know how to take
appropriate action to protect, detect and respond to security
incidents.
Recent security incidents within the organisation have been
traced back to human error and have given rise to the following
security events:
1. Phishing email which resulted in the loss of credentials of a
sensitive system.
2. Ransomware infection which resulted in business disruption
to a key business unit.
3. Data breach of personally identifiable information which
resulted in a data breach notification to impacted individuals
(per the Australian Privacy Act).
In addition to documenting a broad-based program of security
awareness, you will need to research and analyse
one
of these threats and discuss cost-effective awareness measures
to mitigate against them, given the context of your organisation.
Finally, as future investment in cyber security is dependent on
demonstrating the effectiveness of the security awareness
program, you have also been asked to research and document an
effective approach to measuring the effectiveness of the overall
program.
Note: Any assumptions made about the nature of the existing IT
controls at the organisation should be documented in the report.
The report should be written in a professional business
language, aimed at the senior leadership/Executive team of your
organisation and cover the following areas:
· Executive Summary (including business context)
· Security Awareness Needs Assessment
· Security Awareness Strategy and Plan
· Methods for Delivery of Security Awareness
· Threat Discussion (as chosen above)
· Security Awareness Measures and Metrics
Your report should be 3,000 words (+/-10%) in length. You will
need to concentrate on delivering a concise report while
ensuring that all relevant topics are covered with consideration
of the intended audience.
All references and readings must be cited in the report's
bibliography.
Note: The Executive Summary should briefly summarise the
key actions / recommendations
arising from the report. It is not a summary the different
sections or approach contained within the report.
The intent of an Exec Summary is so that corporate Executives
(with v. little time on their hands) can quickly become
acquainted with a large body of material without having to read
the whole report.

More Related Content

Similar to Security Awareness Report An individual assessment in the.docx

The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentBradley Susser
 
ISE 620 Final Project Guidelines and Rubric Overview .docx
ISE 620 Final Project Guidelines and Rubric  Overview .docxISE 620 Final Project Guidelines and Rubric  Overview .docx
ISE 620 Final Project Guidelines and Rubric Overview .docxchristiandean12115
 
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK                .docxRunning Head STATEMENT OF WORKSTATEMENT OF WORK                .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docxtoltonkendal
 
Topic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docxTopic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docxjuliennehar
 
Determine Maintenance strateg.docx
Determine Maintenance strateg.docxDetermine Maintenance strateg.docx
Determine Maintenance strateg.docxDarkKnight367793
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills
 
Project 7 Organization Security PlanChoose an organization from.docx
Project 7 Organization Security PlanChoose an organization from.docxProject 7 Organization Security PlanChoose an organization from.docx
Project 7 Organization Security PlanChoose an organization from.docxwkyra78
 
Document 1Instructions Write at least 500 words and Include at .docx
Document 1Instructions Write at least 500 words and Include at .docxDocument 1Instructions Write at least 500 words and Include at .docx
Document 1Instructions Write at least 500 words and Include at .docxelinoraudley582231
 
Project 7 - Organization Security PlanChoose an organization fro.docx
Project 7 - Organization Security PlanChoose an organization fro.docxProject 7 - Organization Security PlanChoose an organization fro.docx
Project 7 - Organization Security PlanChoose an organization fro.docxanitramcroberts
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policyRossMob1
 
ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
 ISE 510 Final Project Guidelines and Rubric Overview The fi.docx ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
ISE 510 Final Project Guidelines and Rubric Overview The fi.docxaryan532920
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldTEWMAGAZINE
 
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docxyoroflowproduct
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxInfosectrain3
 

Similar to Security Awareness Report An individual assessment in the.docx (20)

The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk Assessment
 
ISE 620 Final Project Guidelines and Rubric Overview .docx
ISE 620 Final Project Guidelines and Rubric  Overview .docxISE 620 Final Project Guidelines and Rubric  Overview .docx
ISE 620 Final Project Guidelines and Rubric Overview .docx
 
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK                .docxRunning Head STATEMENT OF WORKSTATEMENT OF WORK                .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
 
Topic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docxTopic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docx
 
Determine Maintenance strateg.docx
Determine Maintenance strateg.docxDetermine Maintenance strateg.docx
Determine Maintenance strateg.docx
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
 
Project 7 Organization Security PlanChoose an organization from.docx
Project 7 Organization Security PlanChoose an organization from.docxProject 7 Organization Security PlanChoose an organization from.docx
Project 7 Organization Security PlanChoose an organization from.docx
 
Document 1Instructions Write at least 500 words and Include at .docx
Document 1Instructions Write at least 500 words and Include at .docxDocument 1Instructions Write at least 500 words and Include at .docx
Document 1Instructions Write at least 500 words and Include at .docx
 
Project 7 - Organization Security PlanChoose an organization fro.docx
Project 7 - Organization Security PlanChoose an organization fro.docxProject 7 - Organization Security PlanChoose an organization fro.docx
Project 7 - Organization Security PlanChoose an organization fro.docx
 
CISO-Fundamentals
CISO-FundamentalsCISO-Fundamentals
CISO-Fundamentals
 
It risk assessment
It risk assessmentIt risk assessment
It risk assessment
 
Cmgt 400 cmgt400
Cmgt 400 cmgt400Cmgt 400 cmgt400
Cmgt 400 cmgt400
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policy
 
Cybersecurity.pdf
Cybersecurity.pdfCybersecurity.pdf
Cybersecurity.pdf
 
ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
 ISE 510 Final Project Guidelines and Rubric Overview The fi.docx ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
 
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 

More from jeffreye3

Select 2 particular media forum types from the following listNews.docx
Select 2 particular media forum types from the following listNews.docxSelect 2 particular media forum types from the following listNews.docx
Select 2 particular media forum types from the following listNews.docxjeffreye3
 
Select 1 of the datasets.Set up a frequency table.docx
Select 1 of the datasets.Set up a frequency table.docxSelect 1 of the datasets.Set up a frequency table.docx
Select 1 of the datasets.Set up a frequency table.docxjeffreye3
 
Select 1 alternative religion (e.g., Church of Scientology, Tr.docx
Select 1 alternative religion (e.g., Church of Scientology, Tr.docxSelect 1 alternative religion (e.g., Church of Scientology, Tr.docx
Select 1 alternative religion (e.g., Church of Scientology, Tr.docxjeffreye3
 
Select 1 existing or defunct magazine or newspaper, and research its.docx
Select 1 existing or defunct magazine or newspaper, and research its.docxSelect 1 existing or defunct magazine or newspaper, and research its.docx
Select 1 existing or defunct magazine or newspaper, and research its.docxjeffreye3
 
SeleccionarSelect the item that does not belong.¿Lógico o .docx
SeleccionarSelect the item that does not belong.¿Lógico o .docxSeleccionarSelect the item that does not belong.¿Lógico o .docx
SeleccionarSelect the item that does not belong.¿Lógico o .docxjeffreye3
 
SeleccionarSelecciona la respuesta que mejor completa cada oración.docx
SeleccionarSelecciona la respuesta que mejor completa cada oración.docxSeleccionarSelecciona la respuesta que mejor completa cada oración.docx
SeleccionarSelecciona la respuesta que mejor completa cada oración.docxjeffreye3
 
Segmented Assimilation Theory and theLife Model An Integrat.docx
Segmented Assimilation Theory and theLife Model An Integrat.docxSegmented Assimilation Theory and theLife Model An Integrat.docx
Segmented Assimilation Theory and theLife Model An Integrat.docxjeffreye3
 
Seeking your ability to think about criminalsocial issues .docx
Seeking your ability to think about criminalsocial issues .docxSeeking your ability to think about criminalsocial issues .docx
Seeking your ability to think about criminalsocial issues .docxjeffreye3
 
Seeking help with week 4 UOP PSY525 team assignment.  Only one.docx
Seeking help with week 4 UOP PSY525 team assignment.  Only one.docxSeeking help with week 4 UOP PSY525 team assignment.  Only one.docx
Seeking help with week 4 UOP PSY525 team assignment.  Only one.docxjeffreye3
 
Seeking a minimin of one page with scholarly in-text references with.docx
Seeking a minimin of one page with scholarly in-text references with.docxSeeking a minimin of one page with scholarly in-text references with.docx
Seeking a minimin of one page with scholarly in-text references with.docxjeffreye3
 
Seeking a 500 word document that outlines(A) who most commonly .docx
Seeking a 500 word document that outlines(A) who most commonly .docxSeeking a 500 word document that outlines(A) who most commonly .docx
Seeking a 500 word document that outlines(A) who most commonly .docxjeffreye3
 
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docxSEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docxjeffreye3
 
seek limited’s group report &meetingiiTable of C.docx
seek limited’s group report &meetingiiTable of C.docxseek limited’s group report &meetingiiTable of C.docx
seek limited’s group report &meetingiiTable of C.docxjeffreye3
 
Seediscussions,stats,andauthorprofilesforthispublicati.docx
Seediscussions,stats,andauthorprofilesforthispublicati.docxSeediscussions,stats,andauthorprofilesforthispublicati.docx
Seediscussions,stats,andauthorprofilesforthispublicati.docxjeffreye3
 
SEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docx
SEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docxSEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docx
SEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docxjeffreye3
 
See ENF450 Search Strategies and the Student Resources links and sup.docx
See ENF450 Search Strategies and the Student Resources links and sup.docxSee ENF450 Search Strategies and the Student Resources links and sup.docx
See ENF450 Search Strategies and the Student Resources links and sup.docxjeffreye3
 
Seed TagsCollect a variety of seed tags. Take photos of the .docx
Seed TagsCollect a variety of seed tags. Take photos of the .docxSeed TagsCollect a variety of seed tags. Take photos of the .docx
Seed TagsCollect a variety of seed tags. Take photos of the .docxjeffreye3
 
see videohttpsyoutu.be-O5gsF5oylsconsider how hist.docx
see videohttpsyoutu.be-O5gsF5oylsconsider how hist.docxsee videohttpsyoutu.be-O5gsF5oylsconsider how hist.docx
see videohttpsyoutu.be-O5gsF5oylsconsider how hist.docxjeffreye3
 
See Topic on the project 1 paperTarget- Casemanager and care.docx
See Topic on the project 1 paperTarget- Casemanager and care.docxSee Topic on the project 1 paperTarget- Casemanager and care.docx
See Topic on the project 1 paperTarget- Casemanager and care.docxjeffreye3
 
See attachments for information.Looking for assistance on an assig.docx
See attachments for information.Looking for assistance on an assig.docxSee attachments for information.Looking for assistance on an assig.docx
See attachments for information.Looking for assistance on an assig.docxjeffreye3
 

More from jeffreye3 (20)

Select 2 particular media forum types from the following listNews.docx
Select 2 particular media forum types from the following listNews.docxSelect 2 particular media forum types from the following listNews.docx
Select 2 particular media forum types from the following listNews.docx
 
Select 1 of the datasets.Set up a frequency table.docx
Select 1 of the datasets.Set up a frequency table.docxSelect 1 of the datasets.Set up a frequency table.docx
Select 1 of the datasets.Set up a frequency table.docx
 
Select 1 alternative religion (e.g., Church of Scientology, Tr.docx
Select 1 alternative religion (e.g., Church of Scientology, Tr.docxSelect 1 alternative religion (e.g., Church of Scientology, Tr.docx
Select 1 alternative religion (e.g., Church of Scientology, Tr.docx
 
Select 1 existing or defunct magazine or newspaper, and research its.docx
Select 1 existing or defunct magazine or newspaper, and research its.docxSelect 1 existing or defunct magazine or newspaper, and research its.docx
Select 1 existing or defunct magazine or newspaper, and research its.docx
 
SeleccionarSelect the item that does not belong.¿Lógico o .docx
SeleccionarSelect the item that does not belong.¿Lógico o .docxSeleccionarSelect the item that does not belong.¿Lógico o .docx
SeleccionarSelect the item that does not belong.¿Lógico o .docx
 
SeleccionarSelecciona la respuesta que mejor completa cada oración.docx
SeleccionarSelecciona la respuesta que mejor completa cada oración.docxSeleccionarSelecciona la respuesta que mejor completa cada oración.docx
SeleccionarSelecciona la respuesta que mejor completa cada oración.docx
 
Segmented Assimilation Theory and theLife Model An Integrat.docx
Segmented Assimilation Theory and theLife Model An Integrat.docxSegmented Assimilation Theory and theLife Model An Integrat.docx
Segmented Assimilation Theory and theLife Model An Integrat.docx
 
Seeking your ability to think about criminalsocial issues .docx
Seeking your ability to think about criminalsocial issues .docxSeeking your ability to think about criminalsocial issues .docx
Seeking your ability to think about criminalsocial issues .docx
 
Seeking help with week 4 UOP PSY525 team assignment.  Only one.docx
Seeking help with week 4 UOP PSY525 team assignment.  Only one.docxSeeking help with week 4 UOP PSY525 team assignment.  Only one.docx
Seeking help with week 4 UOP PSY525 team assignment.  Only one.docx
 
Seeking a minimin of one page with scholarly in-text references with.docx
Seeking a minimin of one page with scholarly in-text references with.docxSeeking a minimin of one page with scholarly in-text references with.docx
Seeking a minimin of one page with scholarly in-text references with.docx
 
Seeking a 500 word document that outlines(A) who most commonly .docx
Seeking a 500 word document that outlines(A) who most commonly .docxSeeking a 500 word document that outlines(A) who most commonly .docx
Seeking a 500 word document that outlines(A) who most commonly .docx
 
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docxSEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
 
seek limited’s group report &meetingiiTable of C.docx
seek limited’s group report &meetingiiTable of C.docxseek limited’s group report &meetingiiTable of C.docx
seek limited’s group report &meetingiiTable of C.docx
 
Seediscussions,stats,andauthorprofilesforthispublicati.docx
Seediscussions,stats,andauthorprofilesforthispublicati.docxSeediscussions,stats,andauthorprofilesforthispublicati.docx
Seediscussions,stats,andauthorprofilesforthispublicati.docx
 
SEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docx
SEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docxSEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docx
SEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docx
 
See ENF450 Search Strategies and the Student Resources links and sup.docx
See ENF450 Search Strategies and the Student Resources links and sup.docxSee ENF450 Search Strategies and the Student Resources links and sup.docx
See ENF450 Search Strategies and the Student Resources links and sup.docx
 
Seed TagsCollect a variety of seed tags. Take photos of the .docx
Seed TagsCollect a variety of seed tags. Take photos of the .docxSeed TagsCollect a variety of seed tags. Take photos of the .docx
Seed TagsCollect a variety of seed tags. Take photos of the .docx
 
see videohttpsyoutu.be-O5gsF5oylsconsider how hist.docx
see videohttpsyoutu.be-O5gsF5oylsconsider how hist.docxsee videohttpsyoutu.be-O5gsF5oylsconsider how hist.docx
see videohttpsyoutu.be-O5gsF5oylsconsider how hist.docx
 
See Topic on the project 1 paperTarget- Casemanager and care.docx
See Topic on the project 1 paperTarget- Casemanager and care.docxSee Topic on the project 1 paperTarget- Casemanager and care.docx
See Topic on the project 1 paperTarget- Casemanager and care.docx
 
See attachments for information.Looking for assistance on an assig.docx
See attachments for information.Looking for assistance on an assig.docxSee attachments for information.Looking for assistance on an assig.docx
See attachments for information.Looking for assistance on an assig.docx
 

Recently uploaded

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 

Recently uploaded (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

Security Awareness Report An individual assessment in the.docx

  • 1. Security Awareness Report: An individual assessment in the form of a business report. Using the organisation, context and risk profile documented in Continuous Assessment 1 (attached as Continuous assessment 1 word file), write a report detailing the approach you would take to designing, developing and implementing an effective security awareness program for this organisation, based on the following scenario: Your organisation has identified that its people are their best line of defence against the rising threat of cyber-attacks. As the Cyber Security Manager, you have been tasked with developing an ongoing program of security awareness. The key objective is to change the behaviour of all employees to be aware of the various cyber threats and know how to take appropriate action to protect, detect and respond to security incidents. Recent security incidents within the organisation have been traced back to human error and have given rise to the following security events: 1. Phishing email which resulted in the loss of credentials of a sensitive system. 2. Ransomware infection which resulted in business disruption
  • 2. to a key business unit. 3. Data breach of personally identifiable information which resulted in a data breach notification to impacted individuals (per the Australian Privacy Act). In addition to documenting a broad-based program of security awareness, you will need to research and analyse one of these threats and discuss cost-effective awareness measures to mitigate against them, given the context of your organisation. Finally, as future investment in cyber security is dependent on demonstrating the effectiveness of the security awareness program, you have also been asked to research and document an effective approach to measuring the effectiveness of the overall program. Note: Any assumptions made about the nature of the existing IT controls at the organisation should be documented in the report. The report should be written in a professional business language, aimed at the senior leadership/Executive team of your organisation and cover the following areas: · Executive Summary (including business context) · Security Awareness Needs Assessment · Security Awareness Strategy and Plan · Methods for Delivery of Security Awareness
  • 3. · Threat Discussion (as chosen above) · Security Awareness Measures and Metrics Your report should be 3,000 words (+/-10%) in length. You will need to concentrate on delivering a concise report while ensuring that all relevant topics are covered with consideration of the intended audience. All references and readings must be cited in the report's bibliography. Note: The Executive Summary should briefly summarise the key actions / recommendations arising from the report. It is not a summary the different sections or approach contained within the report. The intent of an Exec Summary is so that corporate Executives (with v. little time on their hands) can quickly become acquainted with a large body of material without having to read the whole report.