Buy Existing Paper - Security awareness

Description

Security awareness is defined as the process that involves training and educating employees on Information Technology protection. This process includes programs to educate workers, security policies and coming up with measures to audit the efforts. Security awareness is broken into four different stages; theses are; to determine the current status regarding security, to develop as well as to craft security awareness program, to deploy the said program to employees and to measure the progress that is made by the program. Coming up with a security awareness plan is one of the greatest initiatives that focuses on the improvement of data and IT. The following is what I would put into a security awareness plan.Security awareness

Policies and procedures

Every institution and organization has different policies regarding the use computer resources (Peltier, 2016). In order to implement up to date security technologies, computer resources have to be modified or rather some new policies together with other procedures will have to be created. Therefore it is important to include policies and procedures in a security awareness plan.

Technology

Making use of methods of technologies such as scanning tools, firewalls and others like robust intrusion detection are well required in security awareness plan (Ketel & Shumate, 2015). Technology is also used to update the tools that are used in computing activities.

Remediation

Different organizations have private information that is restricted to other employees. Providing protection for the data is part and parcel of the entire security awareness plan (Simmon, 2018). Therefore for security purposes remediation should be part of security awareness plan.Security awareness

Awareness

The security awareness plan will have an impact to most individuals in institutions, organizations and companies therefore all the employees should be made aware on security awareness on IT (Korovessis, Furnell, Papadaki & Haskell, 2017). They should be provided with training and education on technology policies and provided with security passwords depending on their areas of specialization.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Korovessis, P., Furnell, S., Papadaki, M., & Haskell- Dowland, P. (2017). A toolkit approach to information security awareness and education. Journal of cyber security education, research and practice, 2017(2), 5.

Ketel, M., &Shumate, T. (2015, April). Bring your own device: Security technologies. In SoutheastCon 2015(pp.17). IEEE.

Peltier, T. R. (2016). Information security policies, procedures and standards: guidelines for effective information security management. Auerbach Publication.