TEN POLICIES TO MITIGATE SECURITY THREATS

computer science

Description

Submit a continuous monitoring plan laying out the foundation for continuously monitoring the organization against malicious activities and intentional and unintentional threats. This milestone also focuses on work setting techniques and work planning policies to help employees improve their stress anxiety, fatigue, and boredom. As part of the planned solution, you will propose to mitigate the security gaps for the corporation given in the Case Document. You will need to explain what security tools (firewall, IPS/IDS, antivirus, content filtering, encryption, etc.) and employee readiness strategies (training programs, rewards systems, physical wellness programs, etc.) will be used.


Specifically, the following critical elements must be addressed:

1.  Work Settings:  What strategies do you propose to address distractions, insufficient resources, poor management systems, or inadequate security practices?

2.  Work Planning and Control:  What strategies do you propose to address job pressure, time factors, task difficulty, change in routine, poor task planning or management practice, or lack of knowledge, skills, and ability?

3.  Employee Readiness:  What strategies do you propose to address inattention, stress and anxiety, fatigue  and boredom, illness and injury, drug side effects, values and attitutdes, or cognitive factors (e.g. misperception, memory, or judgement)?


Paper must be 4-5 page Word document, double spacing, 12-point Times New Roman font, and one inch margins, in APA format.


Related Questions in computer science category


Disclaimer
The ready solutions purchased from Library are already used solutions. Please do not submit them directly as it may lead to plagiarism. Once paid, the solution file download link will be sent to your provided email. Please either use them for learning purpose or re-write them in your own language. In case if you haven't get the email, do let us know via chat support.