Managing and Assessing Information Security Policy

Using a graphics program, design several security awareness posters on the following themes: updating antivirus signatures, protecting sensitive information, watching out for e-mail viruses, prohibiting the personal use of company equipment, changing and protecting passwords, avoiding social engineering, and protecting software copyrights. Put the images you produce in a Word document and discuss what each poster advocates.

SLP Assignment Expectations

This assignment will be graded on the originality of the posters and the impact that each poster has on security awareness.

Module 4 – Resources

Managing and Assessing Information Security Policy

Required Reading

Blum, D. (2021). Rational Cybersecurity for Business: The Security Leaders’ Guide to Business Alignment, Apress. Chapter 5-9. Finding Skillsoft Books

(2022) Cybersecurity 101: Auditing & Incident Response. Course. 1st half of course. Finding Skillsoft Books

(2022). Cybersecurity Awareness: Getting Started with Security Foundations. 1st half of course. Finding Skillsoft Books

De Freminville, Marie (2020). Cybersecurity and Decision Makers: Data Security and Digital Trust, Wiley Chapter 3,4,5, and 6. Finding Skillsoft Books

Smallwood, R. F. (2020). Information Governance: Concepts, Strategies and Best Practices, Second Edition. Wiley-VCH. Chapters 1 – 5. Finding Skillsoft Books

Optional Reading

Gregory, P. H. (07/24/2019). CISM® : Certified information security manager practice exams McGraw-Hill. Chapter 4