Cybersecurity Governance

Cybersecurity Governance

Human Resources Insider Threat Guidelines
Step 14: Document Findings in a Presentation

You now have all of the information needed to develop the slide presentation that provides information to the San Francisco City office to avert situations similar to the Childs case.

Develop a narrated slide presentation of 10-15 slides that shows your findings. Include all of the information you gathered from your previous research, summaries, and reports.

Submit your final presentation with appendices when complete.

 

Additional information:

 

Step 1: Review the Terry Childs Case

Before getting started on the presentation, you will want to first learn about the Terry Childs case. Research the case and write a one-page summary of your findings. Your summary should answer the following questions:

  • What led to Childs being charged with a crime?
  • How did his employer respond to his actions? What did it do right and/or wrong?
  • What could the company have done to better secure its assets?

Your summary should be thorough and include a references page. The information gathered will be used in your final presentation. You will use this summary as Appendix A to your presentation.

Submit the Terry Childs Case Review for feedback.

Step 5: Psychological Factors

In the previous three steps, you completed simulation activities handling insiders. In the next few steps, you’ll examine intrusion motives/hacker psychology. In order to fully understand the Terry Childs case, it is important to understand that one’s internal motivations play a significant role in their actions.

Your next assignment will require you to create a Psychological Factor Matrix that summarizes types of hackers and actors, their motivations, and what sort of standards, policies, and guidelines would be most suitable to mitigate their impact. In order to prepare for this assignment, you will need to dig deeper into the psychological factors that affect hackers. Review the hacker psychology and sociological aspects resource on the hackers and actors topic page and document the following:

  • What psychological factors motivate hackers and actors (e.g., addiction, crime, greed, status)?
  • Give examples where these motivations were a factor in a cyberattack.
  • What can organizations do to be more proactive in identifying and addressing these threats?

While you do not need to submit your findings, they will be essential to the completion of your Profile Matrix in a later step.

 

"96% of our customers have reported a 90% and above score. You might want to place an order with us."

Essay Writing Service
Affordable prices

You might be focused on looking for a cheap essay writing service instead of searching for the perfect combination of quality and affordable rates. You need to be aware that a cheap essay does not mean a good essay, as qualified authors estimate their knowledge realistically. At the same time, it is all about balance. We are proud to offer rates among the best on the market and believe every student must have access to effective writing assistance for a cost that he or she finds affordable.

Caring support 24/7

If you need a cheap paper writing service, note that we combine affordable rates with excellent customer support. Our experienced support managers professionally resolve issues that might appear during your collaboration with our service. Apply to them with questions about orders, rates, payments, and more. Contact our managers via our website or email.

Non-plagiarized papers

“Please, write my paper, making it 100% unique.” We understand how vital it is for students to be sure their paper is original and written from scratch. To us, the reputation of a reliable service that offers non-plagiarized texts is vital. We stop collaborating with authors who get caught in plagiarism to avoid confusion. Besides, our customers’ satisfaction rate says it all.

© 2022 Homeworkcrew.com provides writing and research services for limited use only. All the materials from our website should be used with proper references and in accordance with Terms & Conditions.

Scroll to Top