1)Cybersecurity Planning and Management
Creating Company E-mail/WIFI/Internet Use Policies
You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.
There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.
You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.
Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).
5. Policy Compliance
6. Related Standards, Policies and Processes
7. Definitions and Terms
Some useful links and resources for your research:
Don't use plagiarized sources. Get Your Custom Essay onCyber Security
Note: I need 4 pages for the 1st question
2) Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing).
Your written assignment should be 3-4 paragraphs in your own words, and should include a reference citation for your source of information.