This repo contains a digitized version of the course content for CYBR3600 (Information Security Policy) at the University of Nebraska at Omaha.
This project is maintained by MLHale
Due Date: Thursday 12/6 by Class time (1:30PM)
In this short project you will create a training plan for employees at the company you selected/created in Project 2. The end result of your efforts will be an employee training manual that covers at least 3 security policy areas (e.g. physical security, password policy, access control, backup, personal resource usage, etc) and includes a 4th section on countering social engineering.
Each section should include information that describes:
Scope: This training initiative applies to software developers in
Policy/Purpose: Data protection: Without proper training, developers may inadvertently share important trade secrets regarding the operation or construction of software or construction/interoperation of important systems within
Delivery Method: This training initiative will be delivered in the form of role play scenarios and presentations of counter examples that demonstrate previously identified data protection policy violations.
Content: Information regarding the exact nature of intellectual property at
Learning objectives:
• Understand the difference between intellectual property (trade secrets) and publicly releasable information
• Identify situations in which trade secrets can inadvertently be leaked to individuals in the company that do not need to know them or to outside entities
• Raise awareness of trade secret data protection policies at
Prepare a report, of type .md, .pdf, .doc, .docx only, that answers each question above. Clearly follow the format for each training plan section. Submit your report to Canvas by the due date.