Access Controls For Critical Electronic Devices
An organization should establish an effective cybersecurity training program for personnel having authorized access to critical cyber assets.
Create a training plan for everyone who works at the organization. The training plan should address (but is not limited to) the following:
1. Articulate a culture of security awareness, collaboration, and buy-in among management, staff, clients, and stakeholders.
2. Describe common security risks and how to avoid them.
3. Describe policies, access controls, and procedures developed for critical electronic devices and communication networks.
4. Describe the proper use of critical electronic devices and communication networks.
5. Describe the proper handling of critical information.
6. Present action plans and procedures to recover or reestablish critical electronic devices and communication networks.
7. Address the risks resulting from insecure behavior of employees.
APA style is not required, but solid academic writing is expected.
Refer to “CYCYB- 690 Cybersecurity Training Scoring Guide
Performance Level Ratings
Meets Expectations
Performance consistently met expectations in all essential areas of the assignment criteria, at times possibly exceeding expectations, and the quality of work overall was very good. The most critical goals were met.
Near Expectations
Performance did not consistently meet expectations. Performance failed to meet expectations in one or more essential areas of the assignment criteria, one or more of the most critical goals were not met.
Below Expectations
Performance was consistently below expectations in most essential areas of the assignment criteria, reasonable progress toward critical goals was not made. Significant improvement is needed in one or more important areas.
Criteria
Below Expectations
Near Expectations
Meets Expectations
Earned
The student creates a comprehensive training to:
Articulate a culture of security awareness, collaboration, and buy-in among management, staff, clients, and stakeholders.
0 pts – 2 pts
3 pts – 4 pts
5 pts
Describe common security risks and how to avoid them.
0 pts – 6 pts
7 pts – 9 pts
10 pts
Describe policies, access controls, and procedures developed for critical electronic devices and communication networks.
0 pts – 6 pts
7 pts – 9 pts
10 pts
Describe the proper use of critical electronic devices and communication networks.
0 pts – 2 pts
3 pts – 4 pts
5 pts
Describe the proper handling of critical information.
0 pts – 6 pts
7 pts – 9 pts
10 pts
Present action plans and procedures to recover or reestablish critical electronic devices and communication networks.
0 pts – 6 pts
7 pts – 9 pts
10 pts
Address the risks resulting from insecure behavior of employees.
0 pts – 2 pts
3 pts – 4 pts
5 pts
Prose is largely free of mechanical errors. The writer uses a variety of effective sentence structures, figures of speech, and industry terminology.
0 pts – 2 pts
3 pts – 4 pts
5 pts
TOTAL
/60
Instructor Feedback
© 2019. Grand Canyon University. All Rights Reserved.B-690 Cybersecurity Training Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.