Copyright

Cybersecurity Policies - Assignment 1: Developing a Cybersecurity Policy

Instructor: Ryan Villard
If you have a Study.com College Accelerator membership and are seeking college credit for this course, you must submit an assignment and pass the proctored final exam. You must submit your assignment before registering for the final. Below you will find prompts and instructions for submitting your assignment.

About this Assignment

Cybersecurity refers to the protection of sensitive information, specifically that which is stored or accessed via the Internet. An information security policy is a way for an organization to define how this information is protected and what the consequences are for violating these rules. For this final assignment, you will write a 1,200-1,800 word paper outlining a security policy and plan for a business that accepts credit cards and stores customer data. It should focus on the regulatory and ethical aspects of cybersecurity and explain how the policy will comply with applicable consumer privacy and customer data storage laws.

Scenario

Your company, BuyTheTek, has just been named rising star! In order to take your business to the next level, you must start taking and processing credit card orders internally instead of using the small, less reliable 3rd-party company you now have in place. To address this challenge, you brought in a security consultant to ensure you take the right next steps. Per her recommendation, an IT security policy and execution plan needs to be created to conform with privacy and data storage laws and regulations. The policy and subsequent plan should outline the people, process and technology attributes needed to create a secure environment for your soon-to-be extremely happy credit card-paying customers!

Formatting & Sources

Please write your paper in the MLA format. You may refer to the course material for supporting evidence, but you must also use 3 other sources and cite them using the MLA format. Please include a mix of both primary and secondary sources, with at least one source from a security journal. If you use any Study.com lessons as sources, please also cite them in MLA (including the lesson title and instructor's name).

  • Primary sources are first-hand accounts such as interviews, advertisements, speeches, company documents, statements, and press releases published by the company in question.
  • Secondary sources come from peer-reviewed scholarly journals, such as the Oxford Academic Journal of Cybersecurity. You may use sources like JSTOR or Google Scholar to find articles from these journals. Secondary sources may also come from reputable websites with .gov, .edu, or .org in the domain. (Wikipedia is not a reputable source, though the sources listed in Wikipedia articles may be acceptable.)

If you're unsure about how to use the MLA format to cite your sources, please see the following lessons:

Grading Rubric

Your essay will be graded based on the following rubric:

To unlock this lesson you must be a Study.com Member.
Create your account

Register to view this lesson

Are you a student or a teacher?

Unlock Your Education

See for yourself why 30 million people use Study.com

Become a Study.com member and start learning now.
Become a Member  Back
What teachers are saying about Study.com
Try it risk-free for 30 days

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Create an account to start this course today
Try it risk-free for 30 days!
Create An Account
Support