Computer Science

Cyber Security

 

Discuss  the importance of user technology security education within  organizations. What topics should be included in security education and  training?

Directions:

  • Students are required to post one  original response to the discussion questions each week, as well as a  response to one classmate. Original responses should not be a word for  word rehashing of what is stated in the readings, but rather an  integration of the concepts and additional insights, either from real  world experience or additional sources. It should be a 250 word response  to the question each week by 11 p.m. on Wednesday evening. Your primary  posting may end with a tag-line or a related question of your own.  Between 1 a.m. on Thursday and 11 p.m. on Saturday, you should have done  your secondary posting. Your secondary posting is a response to one  classmate’s post. Each answer/response should be supported with  research. Responses to classmates should not be “I agree or “I like the  way you stated that. These responses should again be insightful,  offering an opinion or facts based on your research and experiences. The  response to one classmate should be a minimum of 125 words. See APA  criteria for citing resources. You must provide a minimum of a  reference, in APA format, in your original response.