Security Awareness Training, assignment help

  • Additional Background

    As part of your evaluation of the overall enterprise security profile of Mega-Corp, you discover that the organization participates in accepting and processing credit card payments, but is out of compliance with the PCI standard related to employee security training.You are asked to research potential training options and to recommend to the board of directors how to ensure that the organization is in compliance with this standard.

    Deliverables

    This assessment is composed of the following two deliverable parts:

    Save your time - order a paper!

    Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

    Order Paper Now
    Part 1 – Security Awareness Training Options Presentation

    Create a 4–6 slide PowerPoint presentation that outlines the options available for employee security awareness training.

    • Identify the commercial and custom options that are available to organizations for provision of security awareness training.
    Part 2 – Security Awareness and Training Background and Recommendations

    Develop a 4–6 page document that includes background information and recommendations for the board of directors specific to the employee security awareness training which is optimal for use in the organization.

    • Describe the components of an effective user training and awareness program.
    • Evaluate the advantages and disadvantages of integrating security awareness training as an aspect of the performance review process.
    • Explain how Mega-Corp can use security awareness training to protect information assets against social engineering.
    • Differentiate between security awareness training appropriate for IT and that which is appropriate for non-technical users.
    • Recommend a specific employee security awareness training option.

    Additional Requirements

    • Written communication: Written communication is free of errors that detract from the overall message.
    • APA formatting: Resources and citations are formatted according to current APA style and formatting.
    • Length: 4–6 slide Security Awareness Training Options PowerPoint Presentation, with detailed speakers notes where required; 4–6 page Security Awareness and Training Background and Recommendations Document.
    • Font: Times New Roman, 12 point.
Criteria Non-performance Basic Proficient Distinguished
Explain how organizations can use security awareness training to protect information assets against social engineering.
Does not explain how organizations can use security awareness training to protect information assets against social engineering. Explains incompletely or inaccurately how organizations can use security awareness training to protect information assets against social engineering. Explains how organizations can use security awareness training to protect information assets against social engineering. Explains how organizations can use security awareness training to protect information assets against social engineering including the use of supporting examples.
Recommend a specific employee security awareness training option.
Does not recommend a specific employee security awareness training option. Recommends incompletely or inaccurately a specific employee security awareness training option. Recommends a specific employee security awareness training option. Recommends a specific employee security awareness training option including the use of supporting examples.
Differentiate between security awareness training appropriate for IT and that which is appropriate for non-technical users.
Does not differentiate between security awareness training appropriate for IT and that which is appropriate for non-technical users. Differentiates incompletely or inaccurately between security awareness training appropriate for IT and that which is appropriate for non-technical users. Differentiates between security awareness training appropriate for IT and that which is appropriate for non-technical users. Differentiates between security awareness training appropriate for IT and that which is appropriate for non-technical users including the use of supporting examples.
Explore the commercial and custom options that are available to organizations for provision of security awareness training.
Does not explore the commercial and custom options that are available to organizations for provision of security awareness training. Explores incompletely or inaccurately the commercial and custom options that are available to organizations for provision of security awareness training. Explores the commercial and custom options that are available to organizations for provision of security awareness training. Explores the commercial and custom options that are available to organizations for provision of security awareness training including the use of supporting examples.
Describe the components of an effective user training and awareness program.
Does not describe the components of an effective user training and awareness program. Describes incompletely or inaccurately the components of an effective user training and awareness program. Describes the components of an effective user training and awareness program. Describes the components of an effective user training and awareness program including the use of supporting examples.
Evaluate the advantages and disadvantages of integrating security awareness training as an aspect of the performance review process.
Does not evaluate the advantages and disadvantages of integrating security awareness training as an aspect of the performance review process. Evaluates incompletely or inaccurately the advantages and disadvantages of integrating security awareness training as an aspect of the performance review process. Evaluates the advantages and disadvantages of integrating security awareness training as an aspect of the performance review process. Evaluates the advantages and disadvantages of integrating security awareness training as an aspect of the performance review process including the use of supporting examples.
Exhibit proficiency in writing and use of APA 6th edition.
Does not exhibit proficiency in writing and use of current APA style and formatting. Exhibits a low level of proficiency in writing and use of current APA style and formatting. Exhibits proficiency in writing and use of current APA style and formatting. Exhibits a high level of proficiency in writing and use of current APA style and formatting.