logo

Cybersecurity Training

   

Added on  2022-11-28

4 Pages790 Words406 Views
Running Head: Cybersecurity Training 0
Cybersec
urity
Training
Report
Student name

Cybersecurity Training 1
The training plan
There are some basic things include in the training plan that is necessary for
the cybersecurity of the organization. In the present era, most of the organizations
have used information assets for their business functions to achieve high
performance and profit in their business. there should be some potential challenges
in front of an organization. Therefore, a project manager and staff members should
know about these things, which areas:
Culture of security awareness
Security awareness is necessary to secure all the information assets from
cyber-attacks and cybercrime. In addition, collaboration makes a huge impact on
security and incident response. Besides, employees must care about the data and
information of the company and their customers. In addition, stakeholders must
know about the cybersecurity, which is necessary for their data and financial losses.
An organization has many intellectual properties, which requires security from
physical and technical ends (Andrijcic & Horowitz, 2016).
Security risks
There are three main security risks in an organization, which are physical,
technical, and administrative. An organization should provide three protections to
their information assets and resources, which areas:
Physical protection: all the assets should be in the custody of security personnel,
such as networking devices, servers, data centers, and many others.
Technical Protection: it is necessary to use secure methods for data transfer, such
as cryptography techniques and many others. It will secure their data from hackers.
Administrative protection: legal and regulatory rule and guidelines should be used
for employees and other stakeholders.
Security policies and access controls
There are various policies should be implemented for the access control in
different secure and sensitive areas, such as server room, data center, and many
others. No one can use the internet or private network on the premises. An

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security and IT Infrastructure: Challenges and Solutions
|4
|723
|396

Cyber Security Assignment 2022
|12
|2845
|22

Cyber Security in Corporate Governance: Ways to Improve Cyber Resilience and Integration with Cyber Security
|12
|3215
|375

Cyber security Attacks | Assessment 1
|7
|1374
|30

Introduction to Cyber Security
|14
|3209
|388

Social Engineering and Cybersecurity
|7
|3161
|211