Hello! I need help getting this Essay done. I am writing an Essay currently, and I did not know I would be required to write THREE essays by the end of the term. I have to turn them in tonight!! Please help me get one of these Essay’s done. I’ll attach a PDF with the Rubric and a Word Document with the Case Study. Below I will provide the answers below the below instructions. If you have to go over the deadline, I understand, please just let me know. I just have to get this turned in tonight. If this needs to be 3 pages, I can pay extra. Just let me know. Again, there’s an Essay provided with ALL of the correct answers, however, we cannot copy it beause of plagerism. (C841)
I have provided an answer Essay as an example below, however, DO NOT COPY, it will get plagerism. These answers are easily googled and there’s no real right or wrong answer to much of this stuff.
No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The similarity report that is provided when you submit your task can be used as a guide.
A. Address ethical issues for cybersecurity by doing the following:
1. Discuss the ethical guidelines or standards relating to information security that should apply to the case study.
a. Justify your reasoning.
2. Identify the behaviors, or omission of behaviors, of the people who fostered the unethical practices.
3. Discuss what factors at TechFite led to lax ethical behavior.
B. Describe ways to mitigate problems and build security awareness by doing the following:
1. Describe two information security policies that may have prevented or reduced the criminal activity, deterred the negligent acts, and decreased the threats to intellectual property.
2. Describe the key components of a Security Awareness Training and Education (SATE) that could be implemented at TechFite.
a. Explain how the SATE program will be communicated to TechFite employees.
b. Justify the SATE program’s relevance to mitigating the undesirable behaviors at TechFite.
C. Prepare a summary directed to senior management (suggested length of 1–2 paragraphs) that states TechFite’s ethical issues from Part A and the related mitigation strategies from Part B.
D. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
E. Demonstrate professional communication in the content and presentation of your submission.
ANSWERS / NOTES
Do not use a computer to harm other people.
Protect society and the common good.
Be trustworthy, meaning only enter commitments you can keep, and uphold trusted connections with people.
Have a plan for coordinated vulnerability disclosure.
Respect human rights.
Disclose data on a need-to-know basis and maintain priva
cy. Comply with legal standards.
Two Cybersecurity Policies EXAMPLE WRITING (DO NOT COPY, PLAGERISM)
Two information security policies that could have greatly deterred or prevented the
criminal activity, negligent acts and threats to intellectual property are a proper user account
auditing policy, as well as utilizing a Chinese Wall methodology also known as network
segmentation. Proper auditing of user accounts would ensure that accounts that are not being
used or have excessive access to resources are addressed before any unethical or criminal
activities could transpire in the first place. Due to the lack of a proper auditing policy, the
business intelligence team was able to provision dummy accounts in order to steal other internal
departments’ resources and view sensitive documents without authorization. A Chinese Wall
methodology would have ensured that the business intelligence team would have never been able
to get to those resources in the first place due to being isolated on their own virtual network. The
Chinese Wall methodology would work hand in hand with the auditing policy, as the security
analyst would have been able to see suspicious activity coming from the business intelligence
team and discover quickly that they were trying to perform privilege escalation. The Chinese
Wall methodology would then ensure that the business intelligence team would be unable to
access other departments’ resources.
SATE PROGRAM (DO NOT COPY, PLAGERISM)
The communication of the SATE program should start at the very top and work its way
down the chain of command. Upper management’s responsibility regarding the SATE program
would be to establish the baseline requirements and code of ethics for the program with a focus
on aligning with business and security goals. In addition to this, they should also include the
legal aspects of the program including detailed information on the laws and executive orders that
correspond with cyber-crimes, as well as the punitive measures that manifest with them. After it
has been written, the established program needs internal and external approval to address any
revisions that need to be made. Once the approval process is completed, the training can be
implemented and mandatory schedule can be sent out to all personnel to complete the training
until everyone is compliant.