Chat with us, powered by LiveChat DISCUSSION 8 - STUDENT SOLUTION USA

  Cybersecurity Brochure

Prior to beginning work on this interactive assignment, please read all of the required resources for this week.

For this assignment, you will take on the role of a city administrator tasked with educating the community about cyber crime. You must select one issue related to security and protection in cyber crime, and develop a three-column brochure to inform the general public about your selected issue. Since your brochure is an educational piece for the community, it must contain language that is clear, concise and easy to understand for a non-technical reader. (Use the to begin your work.)

The following elements must be included in your brochure.

  • Column 1: Explain the basic legal rights of businesses or individuals who are affected by your chosen cybercrime issue.
  • Column 2: Explain at least two techniques people within your city can use to protect their businesses and/or themselves from cyber crime.
  • Column 3: Provide a list of resources (including a brief description and contact information) that would provide businesses or individuals in your city with additional information on detection and/or prevention of the chosen issue.

Once you have completed entering the required information into the brochure template, save the template, attach it to your initial post, and submit it to the forum.

 

Required Resources

Articles

Afterman, A. B. (2015). . CPA Journal, 85(11), 52-54.

  • The full-text version of this article can be accessed through the Business Source Elite database in the UAGC Library. This article furthers the discussion on key issues related to cyber risk disclosure.

Dobrian, J. (2015). Journal of Property Management, 80(5), 8-11.

  • The full-text version of this article can be accessed through the Business Source Elite database in the UAGC Library. This article is relevant to professionals in a variety of industries, and offers insights into current and future cybersecurity concerns.

Goldberg, C. A. (2015). . American Journal of Trial Advocacy, 38(3), 519-548.

  • The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article examines the ethical obligations that lawyers have to protect client data.  The author also offers practical recommendations on how attorneys can prevent cyberattacks and data breaches.

Greer, D. (2015). . Futurist, 49(1), 10-15.

  • The full-text version of this article can be accessed through the Business Source Elite database in the UAGC Library. The author of this articles discusses opportunities for investment into the science of cybersecurity, with a focus on the increased needs for security given the and constant rapid change of technology.

Roesener, G., Bottolfson, C., & Fernandez, G. (2014). . Air & Space Power Journal, 28(6), 38-54.

  • The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article provides an update on current United States policies and procedures related to cybersecurity.

Winterberg, B. (2015). . Journal of Financial Planning, 28(7), 34-35.

  • The full-text version of this article can be accessed through the Business Source Elite database in the UAGC Library. This brief article provides an overview of key cybersecurity issues with a focus on the impact for financial advisors.
error: Content is protected !!