Answered You can buy a ready-made answer or pick a professional tutor to order an original one.
Case Study #1: Digital Footprints and Asset ProtectionScenarioWelcome to Padgett-Beale! As a new management intern, your first rotation will be with the Training Team in the Office of Human Resources.
Case Study #1: Digital Footprints and Asset Protection
Scenario
Welcome to Padgett-Beale! As a new management intern, your first rotation will be with the Training Team in the Office of Human Resources. T2, as they like to be known, is part of a collaborative effort to develop a robust internal training program for Padgett-Beale’s employees and managers. Your first assignment is to help develop a training module for security awareness. The training will be included in “first day” training for future employees and will also be presented as part of an on-going series of employee Lunch & Learn seminars offered by the Office of Human Resources.
The topic for this training module will be “Digital Footprints and Asset Protection.” This topic was selected after several members of Padgett-Beale’s leadership team reviewed a program from the United Kingdom’s Centre for the Protection of National Infrastructure that is part of their “embedding security savvy behaviors online” campaign. (See https://www.cpni.gov.uk/my-digital-footprint and https://www.cpni.gov.uk/embedding-security-behaviour-change )
Your deliverable for this assignment will be a briefing paper that identifies and discusses five or more major issues that employees need to be aware of about this topic (Digital Footprints and Asset Protection). After you identify and describe each issue, include two to three additional points that employees should know. Try to keep a neutral tone, that is, you should include items that represent both the benefits and the drawbacks of a digital footprint. You should also address the importance of protecting both personal and company owned digital assets that are part of a digital footprint. See the instructions below for additional information about length, formatting, and citing of sources.
Research
1. Review the Week 1 and 2 readings.
2. Research the term “digital footprint.” Here are some resources to help you get started:
a. https://www.internetsociety.org/your-digital-footprint-matters (there are nine video tutorials on this page)
b. http://blog.trendmicro.com/the-importance-of-understanding-your-digital-footprint/
c. https://cyberbullying.org/the-importance-of-your-digital-reputation
d. https://memeburn.com/2013/06/your-digital-footprint-is-important-heres-how-to-grow-it/
e. https://www.envision-creative.com/why-your-digital-footprint-is-your-best-salesman/
3. Review three or more items in CPNI employee awareness campaign https://www.cpni.gov.uk/my-digital-footprint and https://www.cpni.gov.uk/embedding-security-behaviour-change
4. Research additional ownership, privacy, and security issues associated with a digital footprint.
a. https://us.norton.com/internetsecurity-privacy-clean-up-online-digital-footprint.html
c. https://efinplan.com/estate-planning-for-your-digital-footprint/
5. Find at least one additional source which provides information an employee can use to better protect their own digital assets (the things that contribute to your digital footprint) loss or harm.
Write
Write a 2 page briefing paper in which you present a summary of your research about the topic and your recommendations as to what should be included in the training module. Be choosy about what you include – the total training time available will be 30 minutes. Don’t be too choosy however. Your recommended content should be comprehensive and fully address the training topic.
At a minimum, your briefing paper for this case study must include the following:
1. An introduction to the case scenario and the topic (use the information above)
2. A discussion of five or more key points about the topic (“security and privacy issues”)
3. Recommendations for 5 or more actions that managers and employees should take to address the identified security and privacy issues.
4. A closing section in which you restate the key issues and your recommendations.
As you write your briefing paper, make sure that you address security issues using standard terms and definitions. See the resources listed under Week 1 and under Course Resources > Cybersecurity Concepts for definitions and terminology.
Submit For Grading
Submit your research paper in MS Word format (.docx or .doc file) using the Case Study #1 Assignment in your assignment folder. (Attach your file to the assignment entry.)
Additional Information
1. To save you time, a set of appropriate resources / reference materials has been included as part of this assignment. You must incorporate at least three of these resources into your final deliverable. You must also include one resource that you found on your own.
2. Your briefing paper should use standard terms and definitions for cybersecurity. See Course Content > Cybersecurity Concepts for recommended resources.
3. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s minimum page count. (An example and template file are available in the LEO classroom. See CSIA_Basic_Paper_Template(APA_6ed,Nov2014).docx file under Content > Course Resources.)
4. Your briefing paper should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings to organize your paper. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,Nov2014).docx.
5. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.
6. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).
- @
- 5213 orders completed
- ANSWER
-
Tutor has posted answer for $30.00. See answer's preview
******* ********* *** ***** *********************** digital ********* is * ***** ** *********** **** * **** ******* **** using *** ******** *** ***** ********* **** ** *** ****** ***** *** It ******** *** ********* ***** *** visit ****** ** which *** **** sends and ******* *** *** *********** *** ******* ****** ****** services **** ********** *** **** **** ** **** ***** * digital ********* ** always ******* **** *** * passive ******* ********* and an ****** ******* ********** passive digital ********* ** ******* ****** that * user ****** online ******* noticing ** is ************* *** ******* when *** can ****** a ******* ******* *** web ****** *** ******** **** *** ** ******* and which will ***** identify **** ***** ******** ***** ** active ******* ********* ******** *** kind ** **** that that *** submit knowingly **** ** ******* ** ***** you **** ********* yourself in ****** ***** **** ** ******** *** many ********** ** ******* footprintSince digital footprint ** * very ********* ****** ***** *** very *** ********* ****** ***** employees **** to **** ***** *** ******** ** ******** *** ***** **** ******** ******** what initial ********* ******* ways that * **** can ** ** ***** ***** ******* prints *** ******* ******* *** online shopping ******* **** ********* *** ****** ****** * site they ****** ***** their ********* ****** *** other ******** ** **** ** Social media ***** ****** ******** ** social ***** **** as ******** ******* ****** ****** * ****** **** ** it ** private ****** ****** can **** ** **** to leave * ******* ************ ***** *** ******* ***** digital ********* ** ******** your ******* ********* *** ******* footprint can ** able to be ******* ** ******* **** first and ******** ** * **** ****** be ********** *** ************ **** writing or ****** ********* ****** ***** professional ***** **** * **** ** ******** ** **** something **** ** ******** ******* something *** ******* ** *** ********* *********** **** can ** **** A user is ******** ** ******* ***** the assumption **** nothing ** ******* ** *** ********** addition ** that is to ** ******** **** ******** ****** * habit of checking **** ******* settings ***** *** ***** to ***** ** ***** ** *** ****** ** any ********* *********** **** ** *** ******** to * there **** ******** terms *** ********** ** various ***** and ******** ****** *** is very ********* ** ******** your ******* ************* *** cons of ******* ********* **** *** **** ** * digital ********* ** **** an ********* ***** that ********* need ** **** *** understand ******* ******* *** to manage **** must **** ** able ** ********** ******** *** ******** effects ***** ******* *** of digital **** ********* ** that *** employee's ******** *********** *** be **** ** impersonate them *** example posting * picture ** *** party can **** ** ******* effect ** the future and *** also **** *** ********** **** *** **** ***** *** ** **** ***** *** **** ** *** ******* ********* *** **** *** ** used ** get *** ********** *** *********** **** ******* ***** **** expertise *** your ********* ****** can ** used to *** secure *** * *** ****** *** **** can help to ***** your professional networkProtecting *********** assetDigital ********* ** **** ********* when it ***** to protecting *********** ***** *** **** businesses **** **** mostly on ****** ******** to ****** their business *** ***** ******* ********* is important ** them ***** there *** **** ****** of sensitive *********** uploaded ****** ** ****** ** **** ** ******** for *** ******** mostly ** *** ********* ******* where ******* *************** *** ***** to ********* hackers ConclusionIn ********** ******** a ******** image ** * great *** to ****** that your ******* footprint has a value to you *** **** career ** ** employee ** ** ****** to understand ********* *** *** *** ** **** ** manage *** or *** *** digital ********* and *** **** and **** ** digital ********* ******* an individual *** *** ******* at *******