Reducing Risk

Unit: Reducing Risk

Grading Type: Numeric

Points Possible: 150

Points Earned:

Deliverable Length: 500-700 words

View objectives for this assignment

Go To:

· Assignment Details

· Scenario

· Learning Materials

· Reading Assignment

My Work:

Online Deliverables:

· Submissions

Looking for tutoring? Go to Smarthinking

Collapse All | Expand All Collapse All | Expand All

Assignment Details

Assignment Description

Many organizations collect a significant amount of data that are used to create useful information. This information is used by the organization to manage personnel, customers, and resources and to measure business performance. Some information is more valuable and sensitive than other types of information used in the organization and therefore, information should be protected depending on its type. This includes the computers and networks used to process, transmit, or store data as well. Data classification schemes are often developed to address these issues. Some common schemes are identified as the following:

· Unclassified, Confidential, Secret, and Top Secret

· Public, Sensitive, and Confidential

· Company Proprietary, Business-Sensitive, and Critical

· PII, Business, and Public

Identify a data classification scheme for an organization that processes, transmits, and stores various types of data and information related to day-to-day activities. Consider data and information that may be created, handled, or disseminated by various types of business units in the organization.

Assignment Details

Part 1: Write a paper of 500-700 words that will be presented to the board of directors or executive management that includes the following:

· Explain why it is necessary for an organization to consider developing a data classification scheme.

· You will describe a policy that implements the data classification scheme for your organization that processes, transmits, or stores different types of data and information.

· Finally, explain how you would communicate the importance of a policy that implements a data classification scheme for an organization to reduce risks related to unauthorized access and disclosure.

· You should consider how you would classify and handle the following information:

· Onboarding information related to a new employee hire (application, resume, Social Security number, driver’s license, or emergency contact)

· Research and design information for a new product line that no other competitor has

· Press release about the acquisition of a new business unit

· Operational financial reports that articulate the performance of the sales force in relation to competitors

· There should also be a communication strategy section that includes the identification and proposal of an appropriate policy to support a data and information classification scheme to address the organizational needs.

Name the document “Yourname_CYBR609_IP4.”

Part 2: Create a Key Assignment outline based on your work in IPs 1–4, and post it in the Discussion Board for others to review.

Please submit your assignment.

For assistance with your assignment, please use your text, Web resources, and all course materials.

Reading Assignment

Unit 4: CYBR609 CTU Library Guide

Wells, A. (2018). The Tech Professional’s Guide to Communicating in a Global Workplace: Adapting Across Cultural and Gender Boundaries. New York, NY: Apress.

Assignment Objectives

· Apply the relevant cybersecurity theoretical and practical knowledge behind communication and persuasive speaking

· Construct persuasive messages to apply across various audiences, especially those with differing levels of cybersecurity and technical expertise

Other Information

There is no additional information to display at this time.

Legend

· Extra Credit

· View Assignment Rubric

Collapse All | Expand All Collapse All | Expand All

Assignment Details

Assignment Description

Many organizations collect a significant amount of data that are used to create useful information. This information is used by the organization to manage personnel, customers, and resources and to measure business performance. Some information is more valuable and sensitive than other types of information used in the organization and therefore, information should be protected depending on its type. This includes the computers and networks used to process, transmit, or store data as well. Data classification schemes are often developed to address these issues. Some common schemes are identified as the following:

· Unclassified, Confidential, Secret, and Top Secret

· Public, Sensitive, and Confidential

· Company Proprietary, Business-Sensitive, and Critical

· PII, Business, and Public

Identify a data classification scheme for an organization that processes, transmits, and stores various types of data and information related to day-to-day activities. Consider data and information that may be created, handled, or disseminated by various types of business units in the organization.

Assignment Details

Part 1: Write a paper of 500-700 words that will be presented to the board of directors or executive management that includes the following:

· Explain why it is necessary for an organization to consider developing a data classification scheme.

· You will describe a policy that implements the data classification scheme for your organization that processes, transmits, or stores different types of data and information.

· Finally, explain how you would communicate the importance of a policy that implements a data classification scheme for an organization to reduce risks related to unauthorized access and disclosure.

· You should consider how you would classify and handle the following information:

· Onboarding information related to a new employee hire (application, resume, Social Security number, driver’s license, or emergency contact)

· Research and design information for a new product line that no other competitor has

· Press release about the acquisition of a new business unit

· Operational financial reports that articulate the performance of the sales force in relation to competitors

· There should also be a communication strategy section that includes the identification and proposal of an appropriate policy to support a data and information classification scheme to address the organizational needs.

Name the document “Yourname_CYBR609_IP4.”

Part 2: Create a Key Assignment outline based on your work in IPs 1–4, and post it in the Discussion Board for others to review.

Please submit your assignment.

For assistance with your assignment, please use your text, Web resources, and all course materials.

Reading Assignment

Unit 4: CYBR609 CTU Library Guide

Wells, A. (2018). The Tech Professional’s Guide to Communicating in a Global Workplace: Adapting Across Cultural and Gender Boundaries. New York, NY: Apress.

Assignment Objectives

· Apply the relevant cybersecurity theoretical and practical knowledge behind communication and persuasive speaking

· Construct persuasive messages to apply across various audiences, especially those with differing levels of cybersecurity and technical expertise

Other Information

There is no additional information to display at this time.

Legend

· Extra Credit

· View Assignment Rubric

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our Guarantees

Money-back Guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism Guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision Policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy Policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation Guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
error: