Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

We have learned from previous modules how important it is to educate employees about best practices in information security. When employees are armed with information,

We have learned from previous modules how important it is to educate employees about best practices in information security. When employees are armed with information, they make better decisions about their own behaviour.
For this assignment, you will work as a pair to create an educational video for employees. The purpose of the video is to briefly explain an issue in information security and inform users of what they can do to help reduce that risk.
Your video could be on any type of malware, including ransomware, that you learned about in the previous module, or any type of malware that was not included in the module. Your video could also be on shadow IT, or any other issue related to information security. The main idea is that you are making the video from the perspective of the IT department to educate your fellow employees.
This assignment will evaluate the following course learning outcomes:
Explain IT governance best practices and deliverables based on their purpose and appropriate applications.
Analyze IT governance challenges to identify their possible causes and recommend appropriate actions according to industry best practices.
Step 1
Join a group (maximum two people) by navigating to Course Tools, then Groups. Enrol yourself in a group and reach out to your partner to begin planning the assignment.
Step 2
Lights camera action! Feel free to be as creative as you like for this assignment. You may use any video format you choose. You could record yourself speaking to the camera, you could narrate a PowerPoint presentation, or you can do something entirely different!
Whatever way you deliver the information, be sure to include the following:
Explain the security issue. Assume that your audience is not necessarily tech-savvy.
Explain why its an issue or why it is a risk to them and/or the organization.
Explain what the user should do, or not do, to help maintain information security.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

Question How are VEBA assets allocated when a plan terminates?

Answered: 1 week ago

Question

Question May a taxpayer roll over money from an IRA to an HSA?

Answered: 1 week ago

Question

Question What is the doughnut hole in HSA coverage?

Answered: 1 week ago