University of Houston Downtown Cyber Security Discussion
Question Description
I’m working on a cyber security exercise and need a sample draft to help me learn.
All good security programs address 3 key layers of activity: security tools, documented processes, and educating users. Scenario – You are the new IT security manager of a small company with 300 users. The CIO recently announced a project of moving more data to the cloud. The legal team ahs raised concerns about not properly protecting the data because we don’t know exactly the type of data that’s in all the files marked for the move.
She wants you to provide her a write up that summarizes the steps your company needs to carry out. There are resources in the weekly content folder. As you provide the steps to the classification, be sure to explain how you plan to carry this out utilizing the 3 key areas available to you – people, processes, and tools.

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."