Cybersecurity Brochure Prior to beginning work on this interac
Cybersecurity Brochure
Prior to beginning work on this interactive assignment, please read all of the required resources for this week.
For this assignment, you will take on the role of a city administrator tasked with educating the community about cyber crime. You must select one issue related to security and protection in cyber crime, and develop a three-column brochure to inform the general public about your selected issue. Since your brochure is an educational piece for the community, it must contain language that is clear, concise and easy to understand for a non-technical reader. (Use the CRJ631 Cybersecurity Brochure templateDownload CRJ631 Cybersecurity Brochure template to begin your work.)
The following elements must be included in your brochure.
- Column 1: Explain the basic legal rights of businesses or individuals who are affected by your chosen cybercrime issue.
- Column 2: Explain at least two techniques people within your city can use to protect their businesses and/or themselves from cyber crime.
- Column 3: Provide a list of resources (including a brief description and contact information) that would provide businesses or individuals in your city with additional information on detection and/or prevention of the chosen issue.
Once you have completed entering the required information into the brochure template, save the template, attach it to your initial post, and submit it to the forum.
Required Resources
Articles
Afterman, A. B. (2015). The issue of cyber risk disclosuresLinks to an external site.. CPA Journal, 85(11), 52-54.
- The full-text version of this article can be accessed through the Business Source Elite database in the UAGC Library. This article furthers the discussion on key issues related to cyber risk disclosure.
Dobrian, J. (2015). Are you sitting on a cyber security bombshell?Links to an external site. Journal of Property Management, 80(5), 8-11.
- The full-text version of this article can be accessed through the Business Source Elite database in the UAGC Library. This article is relevant to professionals in a variety of industries, and offers insights into current and future cybersecurity concerns.
Goldberg, C. A. (2015). Rebooting the small law practice: A call for increased cybersecurity in the age of hacks and digital attacksLinks to an external site.. American Journal of Trial Advocacy, 38(3), 519-548.
- The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article examines the ethical obligations that lawyers have to protect client data. The author also offers practical recommendations on how attorneys can prevent cyberattacks and data breaches.
Greer, D. (2015). Six key areas of investment for the science of cyber securityLinks to an external site.. Futurist, 49(1), 10-15.
- The full-text version of this article can be accessed through the Business Source Elite database in the UAGC Library. The author of this articles discusses opportunities for investment into the science of cybersecurity, with a focus on the increased needs for security given the and constant rapid change of technology.
Roesener, G., Bottolfson, C., & Fernandez, G. (2014). Policy for US cybersecurityLinks to an external site.. Air & Space Power Journal, 28(6), 38-54.
- The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article provides an update on current United States policies and procedures related to cybersecurity.
Winterberg, B. (2015). Cybersecurity: Hitting a moving targetLinks to an external site.. Journal of Financial Planning, 28(7), 34-35.
- The full-text version of this article can be accessed through the Business Source Elite database in the UAGC Library. This brief article provides an overview of key cybersecurity issues with a focus on the impact for financial advisors.
0
( Community Cybersecurity Update )
( Resources Remove this text and provide a list of resources (including a brief description and contact information) that would provide businesses or individuals in your city with additional information on detection and/or prevention of the chosen issue. ) ( Protect Yourself Remove this text and explain at least two techniques people within your city can use to protect their businesses and/or themselves from cyber crime. ) ( Your Legal Rights Remove this text and explain the basic legal rights of businesses or individuals who are affected by your chosen cyber crime issue. )
image6.jpeg
image7.png
image8.png
image9.jpeg
image1.png
image2.png
image3.png
image4.jpeg
image5.jpeg
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.