CyberLeet Technologies: Comprehensive Cybersecurity Training Manual

Verified

Added on  2023/06/15

|25
|3951
|416
Report
AI Summary
This document presents a company training manual for CyberLeet Technologies, a cybersecurity firm, designed for new information security analysts. It covers essential principles and practices, starting with an introduction to CyberLeet, its operations, and its role in the industry. The manual then delves into the core tenets of cybersecurity: confidentiality, integrity, and availability, explaining their significance and practical application. Furthermore, it outlines the development of cybersecurity policies, including password policies, acceptable use policies, and user training policies. Finally, the manual addresses threat mitigation scenarios such as theft and malware, providing guidance on how to handle these situations effectively. The manual aims to equip new hires with the knowledge and skills necessary to succeed in their roles and protect CyberLeet's clients from various cyber threats. Desklib provides this and other solved assignments for students.
Document Page
Company Training Manual
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Company Training Manual
Prepared by:
[Student first and last name]
Document Page
CYBERLEET TRAINING MANUAL
MANUAL OVERVIEW 4
SECTION 1: INTRODUCTION: WELCOME TO CYBERLEET 5
1.1 INTRODUCTION 5
1.2 YOUR ROLE AT CYBERLEET 5
1.3 PURPOSE OF THIS MANUAL 6
SECTION 2: CORE TENETS OF CYBERSECURITY 7
2.1 CONFIDENTIALITY 7
2.2 INTEGRITY 7
2.3 AVAILABILITY 8
SECTION 3: CYBERSECURITY POLICIES 9
3.1 PASSWORD POLICIES 9
3.2 ACCEPTABLE USE POLICIES 9
3.3 USER TRAINING POLICIES 10
3.4 BASIC USER POLICIES 10
SECTION 4: THREAT MITIGATION SCENARIOS 11
4.1 THEFT 11
4.2 MALWARE 11
4.3 YOUR CHOICE 12
SECTION 5: REFERENCES 13
C o m p a n y M a n u a l P a g e | 3
Document Page
CYBERLEET TRAINING MANUAL
MANUAL OVERVIEW
You are the training manager at CyberLeet Technologies, a midsized firm that provides
cybersecurity services to other businesses. CyberLeet’s core customer base is sole
proprietorships and other mom-and-pop shops that are too small to have their own IT
departments and budgets. Generally speaking, your clients have a reasonably high risk
tolerance, and put a premium on the functionality of their IT systems over stringent security
measures. However, you also have clients that must protect highly sensitive information in
order to continue operating successfully. For example, CyberLeet supports a few small
public-accounting firms that need to maintain important tax-related information, as well as
several day-care businesses that must keep children’s health records private while allowing
necessary access for certain caregivers. In the past year, CyberLeet has experienced rapid
growth, which means you can no longer personally provide one-on-one training to every
new information security analyst as they are hired. Therefore, you have decided to create a
training manual that will explain to the current and future cohorts of new hires the essential
principles and practices that they must understand in order to be successful in their role as
information security analysts at CyberLeet.
Manual Layout
There are four sections in the manual, which cover all the components of a new employee training
manual. As the training manager, you must complete each section using information you learned in
this course. Refer to the background information on CyberLeet and apply the appropriate
information that best matches based on the size of the company, the value of cybersecurity, and its
core tenets. Apply best practices of cybersecurity principles for addressing the common threat
scenarios of a sole proprietary business. The main sections of the manual you are responsible for
completing are the following:
Introduction
Core tenets of cybersecurity
Developing cybersecurity policies
Threat mitigation scenarios
C o m p a n y M a n u a l P a g e | 4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBERLEET TRAINING MANUAL
In Section One, describe the organization. Provide a short history of the company, define the way it
operates, and describe its place within the industry and the community it serves. Follow the prompts
to complete each section. All prompts should be deleted prior to submitting this section.
C o m p a n y M a n u a l P a g e | 5
Document Page
CYBERLEET TRAINING MANUAL
SECTION 1: Introduction: Welcome to
CyberLeet
C o m p a n y M a n u a l P a g e | 6
Document Page
CYBERLEET TRAINING MANUAL
1.1 Introduction
CyberLeet Technologies provides cybersecurity services to many organizations. This
organization mainly tends to provide security to tax related information to many
organizations and also helps in securing the personal data, which is stored in records.
Cybersecurity issue can cause certain problems like breach of important data, which can
ultimately damage the reputation or image of an organization. There are various small
business like little shops that may not have efficient cyber medium to make their presence
known. CyberLeet provides help to those business by connecting their businesses to the
internet with strong security. It can be said that small business firms often withdraw the
decision to go online as they are afraid of data theft and exploitation. These firms are
approached with proper solution to their problems. Thus, CyberLeet is helping several clients
in accessing the internet with security and encouraging them to take a step forward.
Utilization of internet in business has been the most crucial aspect. Sensitive data are
exchanged via internet in all sorts of businesses. Loss or damaging of the data can be very
much dangerous. These data are what drive the enterprises today and these need to be
protected at all costs. Security is also the right of every individual. Business firms engage in
data exchange on a daily basis and these data are based on sensitive, confidential information.
Business firms require these information to be safe while transmitting them via internet
repeatedly. Therefore, the information security is the biggest concern for all business firms
and that is why they demand information security. Quick pace of execution and easy access
are the most beneficial features offered by the internet. However, to use those features,
clients need to be sure that internet can provide the sufficient security for the information. For
the growth of business, daily access to the internet is mandatory and therefore, data security
is essential.
Cybersecurity issues can be of several forms. Breach of data, system blocking are the sort of
C o m p a n y M a n u a l P a g e | 7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBERLEET TRAINING MANUAL
harmful effects caused by vulnerable cyber systems. If a business firm experiences data
breach then all of its confidential financial data can be exposed. Due to this, the competing
firms can take huge amount of advantage. Revealing sensitive data can damage the business
strategies, the business operations can face halts and therefore, losses are bound to incur. The
firm will also spend huge amount of money in enhancing the information system. People
involved with this business such as clients and customers get deeply affected from
cybersecurity problems. Businesses deal with the sensitive information of the customers and
revealing those information means that the security of the customers are compromised. This
will not only terrorize the customers and clients, but also the firms will lose its customers
base by damaging its reputation. Rebuilding and developing the information security,
improvising the business strategies and reimbursing the losses will consume huge amount of
time.
1.2 Your Role at CyberLeet
As an information security analyst of CyberLeet Technologies there are certain number of
responsibilities which are needed to be carried out. Security analyst perform a large number
of activities like analysing the present and future needs of the organization. The ultimate
goal is to provide individual training and development plan which can satisfy the needs of
the organization.
C o m p a n y M a n u a l P a g e | 8
Document Page
CYBERLEET TRAINING MANUAL
1.3 Purpose of This Manual
As an information security analyst there are certain number of activities that are needed to be
performed like proper planning and measurement of security measures for protection of
computer systems, networks and data (Kelly, 2012). If they do not provide good service, then
it can lead to breach of their important data and interruption of various services provided by
CyberLeet Technologies.
C o m p a n y M a n u a l P a g e | 9
Document Page
CYBERLEET TRAINING MANUAL
A widely applicable security model is the CIA triad, standing for confidentiality, integrity, and
availability. There are three key principles that should be guaranteed in any kind of secure system. In
Section Two, describe the significance of each area as directed in each designated area. Follow the
prompts to complete each section. All prompts should be deleted prior to submitting this section.
C o m p a n y M a n u a l P a g e | 10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBERLEET TRAINING MANUAL
SECTION 2: Core Tenets of Cybersecurity
C o m p a n y M a n u a l P a g e | 11
Document Page
CYBERLEET TRAINING MANUAL
2.1 Confidentiality
It is often assumed that confidentiality is directly related to privacy; however, confidentiality
has nothing to do with the privacy policies of information. Confidentiality can be thought of
as the parameter that draws a boundary on the usage of information. In other words,
confidentiality is the term that is employed to limit the amount of accessibility towards
certain information. Therefore, it is different from the term “privacy”. Privacy means not to
share any information to other parties. Information can be either sharable or sensitive, may be
both. In case of sensitive data, confidentiality is ensured by means of certain measures
(Mirkovic, & Benzel, 2012). These measures are devised in a way so that the wrong group
does not get access to the information, but the right one does. Data are also managed in a way
so that the risk of data breach can be handled efficiently.
In the business context, the firms work with sensitive information daily and these information
are vulnerable as well. Assuring safety of the data is necessary and the safety can be achieved
through training processes. In the trainings, people are mad aware of the risks associated with
the data, they are trained through scenarios as to how unauthorized release of such
information can harm the businesses and what measures should be taken to tackle the
situations of confidentiality breach. The most adopted technique of providing confidentiality
is encryption. Two-Factor Authentication is another method of ensuring confidentiality by
providing two mechanisms separately verifying the users. There are stronger security
ensuring methods such as biometric authentication, security tokens, soft tokens etc.
Confidentiality ensures that the users are provided with the means to minimize the scope of
usage of the information in a transactional process. Users can also limit the number of
repeated appearance of the data during transaction. Specific mechanism are provided for
extreme confidentiality such as air-gapped systems. Many strategic data of business firms are
only kept in physical form rather than digital. Disconnected storage systems can be used to
C o m p a n y M a n u a l P a g e | 12
chevron_up_icon
1 out of 25
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]