Cybersecurity Threats and Challenges Paper

Question Description

This course explores the evolution from information security to cyber security, policy and cyber security development and the relationships between business and public/private sector organizations in meeting the challenges of cyber security threats. Students will be introduced to the legal and regulatory requirements for internal network and internet security both as they apply to business and personal use. Vulnerabilities of both the organization and the individual will be reviewed as well as the processes and controls for mitigating cyber security threats. The need for an IT audit will also be explored as part of the vulnerability/mitigation process as well as the need for development of an organization-wide cyber security policy.