Professional Documents
Culture Documents
Student’s Name
Professor’s Name
Institutional Affiliations
Course
Due Date
2
It would help if you were acquainted with our organization's security rules as an
information technology specialist. Employees and other organization people may contribute
to security events by their actions or inactions. Employees and other members of the
organization's staff, for example, may offer information that might be utilized in a social
engineering attack, fail to report suspicious activity, improperly access sensitive data
unrelated to the user's purpose, and so on. Consequently, organizations must develop a
security awareness program to ensure that workers understand the important nature of
protecting sensitive data, the steps they should take to secure data management, and the
dangers associated with wrong data handling. When it comes to the functioning of a business,
workers must be aware of the organizational and personal implications of misusing sensitive
My current job title and responsibilities are system administrator, which means I'm in
charge of the security and upkeep of several systems throughout a company. As federal
workers, we must follow a slew of classified healthcare rules and procedures as part of our
the critical aspect of our organization's security policy. After completing this course, I will
the Advanced Computer Security program, we will better grasp how security threats are
created, establishing more effective strategies and security plans to protect our firm. The
abilities I learned in this course will help me in various situations, such as spotting threats,
managing risks, and rapidly recovering from disruptive occurrences in my future workplace,
The company's security policy governs who has access to systems and data. To
safeguard the system and the data, it contains, a set of rules, regulations, and processes has
3
been developed. Depending on who you speak with, it may be referred to as an information
and technology and the privacy of individual employees and the corporation as a whole
(Wang, & Yang, 2017). It also serves as a conspicuous reminder to the rest of the world of
the organization's commitment to high levels of safety and security. In an ideal world,
that assured the confidentiality, integrity, and availability of the data they held. The ability of
and it is used to secure it. We cannot afford to neglect the confidentiality, integrity, or
are critical to a system's integrity because they control access and serve as a basis for
integrity, must be impenetrable to manipulation. This is a major concern since the system's
problems as quickly as feasible (Daimi et al., 2018). There are a variety of approaches that
may be utilized to establish and implement a security program, and they don't all have to be
one-size-fits-all. Because there is no other viable option and the crucial management control
References
Daimi, K., Francia, G., Ertaul, L., Encinas, L. H., & El-sheikh, E. (Eds.). (2018). Computer
Wang, Y., & Yang, J. (2017, March). Ethical hacking and network defense: choose your best