Overview Data security and data privacy protection are key aspects of the cybers

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Overview
Data security and data privacy protection are key aspects of the cybers

Overview
Data security and data privacy protection are key aspects of the cybersecurity domain. To address the concerns of data security and privacy, a practitioner must account for a number of competing drivers, including regulatory compliance, operational impact, cost, as well as customer and employee satisfaction. As a practitioner, you will be called upon to identify requirements and make recommendations for technology-, policy-, and workforce-related approaches to ensure that appropriate measures are in place to adequately secure data and protect individual privacy in a constantly changing threat environment. In this project, you will recommend an approach to address the legal and ethical aspects of a security-relevant business decision.
In this assignment, you will demonstrate your mastery of the following course competency:
Make recommendations regarding legal and ethical issues in cybersecurity appropriate for the organizational environment
Scenario
Your instructor will provide you with the specific scenario for this project in an announcement. This scenario places you back in the role of an executive-level security consultant for the organization. The scenario will provide you additional details surrounding the organization’s decisions on the proposal you addressed in Project One. To complete this task, you will prepare a legal and ethical recommendation brief for the internal stakeholder board in order to identify an approach to meeting the privacy protection, data security, and ethical needs of the scenario.
Prompt
Write a brief memorandum to the internal leadership board outlining your recommendations for meeting the needs of the scenario. You must address the critical elements listed below. The codes shown in brackets indicate the course competency to which each critical element is aligned.
Recommend an approach to protecting data privacy. Support your recommendation with evidence from applicable laws or the corporate mission and values.
Recommend an approach to ensuring data security.Support your recommendation with evidence from applicable laws or the corporate mission and values.
Describe how ethical considerations about data use influenced your recommendations for security-enhancing safeguards.
What to Submit
Your submission should be 1 to 3 pages in length and should use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA style. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_100_Project_One_Neo_Anderson.docx.
Project Two Rubric
CriteriaExemplary (100%)Proficient (85%)Needs Improvement (55%)Not Evident (0%)Value
Data PrivacyMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerRecommends an approach to protecting data privacy, including support from applicable laws or the corporate mission and valuesAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant30
Data SecurityMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerRecommends an approach to ensuring data security, including support from applicable laws or the corporate mission and valuesAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant30
Ethical ConsiderationsMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerDescribes how ethical considerations about data use influenced the recommendations for security-enhancing safeguardsAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant30
Articulation of ResponseSubmission is free of errors related to grammar, spelling, and organization and is presented in a professional and easy-to-read formatSubmission has no major errors related to grammar, spelling, or organizationSubmission has some errors related to grammar, spelling, or organization that negatively impact readability and articulation of main ideasSubmission has critical errors related to grammar, spelling, or organization that prevent understanding of ideas10
Total: 100%

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount