Instructions:
Part One:
keep this part separated from part two and each sub-part. Once completed,forward part one and continue to part two.
– Part 1A:
How can the National Institute of Standards and Technology (NIST) help your company create a “best practices” cybersecurity policy?
Your discussion should touch upon both the positive and the negative aspects of a well-structured policy.
Two scholarly journals needed
– Part 1B:
What is an Advanced Persistent Threat (APT)? What is the goal of an APT? How can a business protect itself from an APT? What tools can be used to detect an APT? Provide links to sources or sites that explain these tools in more detail.
Two scholarly journals needed
Part Two: (Title: Cybersecurity policy)
-Write an essay on the topic “building and implementing a successful cybersecurity policy.” The following content areas should be covered in the essay:
1. What would be a successful cybersecurity policy?
2. What are the ingredients of a typical cybersecurity policy?
3. How should the various elements of a cybersecurity policy be articulated?
4. What considerations should there be to implement the policy successfully?
5. How can you assure the ongoing success of the policy?
Your paper should meet the following requirements:
• Be 3 pages in length, not including the cover page and reference page.
• Follow the APA guidelines. Each paper should include an introduction, a body with at least two fully developed paragraphs, and a conclusion.
• Support your answers with at least three scholarly journal articles from the US only. The scholarly journal should not be older than two years old.
• Be clearly and professionally written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. Additionally, the essay should be written in an instructional point of view and not from a first, second, or third point of view (e.g., I, them, or we). Lastly, do not use “This paper will…” as that is not allowed in an academic paper.