DISCUSSION 8


  Cybersecurity Brochure

Prior to beginning work on this interactive assignment, please read all of the required resources for this week.

For this assignment, you will take on the role of a city administrator tasked with educating the community about cyber crime. You must select one issue related to security and protection in cyber crime, and develop a three-column brochure to inform the general public about your selected issue. Since your brochure is an educational piece for the community, it must contain language that is clear, concise and easy to understand for a non-technical reader. (Use the CRJ631 Cybersecurity Brochure templateDownload CRJ631 Cybersecurity Brochure template to begin your work.)

The following elements must be included in your brochure.

  • Column 1: Explain the basic legal rights of businesses or individuals who are affected by your chosen cybercrime issue.
  • Column 2: Explain at least two techniques people within your city can use to protect their businesses and/or themselves from cyber crime.
  • Column 3: Provide a list of resources (including a brief description and contact information) that would provide businesses or individuals in your city with additional information on detection and/or prevention of the chosen issue.

Once you have completed entering the required information into the brochure template, save the template, attach it to your initial post, and submit it to the forum.

 

Required Resources

Articles

Afterman, A. B. (2015). The issue of cyber risk disclosuresLinks to an external site.. CPA Journal, 85(11), 52-54.

  • The full-text version of this article can be accessed through the Business Source Elite database in the UAGC Library. This article furthers the discussion on key issues related to cyber risk disclosure.

Dobrian, J. (2015). Are you sitting on a cyber security bombshell?Links to an external site. Journal of Property Management, 80(5), 8-11.

  • The full-text version of this article can be accessed through the Business Source Elite database in the UAGC Library. This article is relevant to professionals in a variety of industries, and offers insights into current and future cybersecurity concerns.

Goldberg, C. A. (2015). Rebooting the small law practice: A call for increased cybersecurity in the age of hacks and digital attacksLinks to an external site.. American Journal of Trial Advocacy, 38(3), 519-548.

  • The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article examines the ethical obligations that lawyers have to protect client data.  The author also offers practical recommendations on how attorneys can prevent cyberattacks and data breaches.

Greer, D. (2015). Six key areas of investment for the science of cyber securityLinks to an external site.. Futurist, 49(1), 10-15.

  • The full-text version of this article can be accessed through the Business Source Elite database in the UAGC Library. The author of this articles discusses opportunities for investment into the science of cybersecurity, with a focus on the increased needs for security given the and constant rapid change of technology.

Roesener, G., Bottolfson, C., & Fernandez, G. (2014). Policy for US cybersecurityLinks to an external site.. Air & Space Power Journal, 28(6), 38-54.

  • The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article provides an update on current United States policies and procedures related to cybersecurity.

Winterberg, B. (2015). Cybersecurity: Hitting a moving targetLinks to an external site.. Journal of Financial Planning, 28(7), 34-35.

  • The full-text version of this article can be accessed through the Business Source Elite database in the UAGC Library. This brief article provides an overview of key cybersecurity issues with a focus on the impact for financial advisors.