are critical in understanding the legal and ethical procedures to follow as a security professional. In support of cybersecurity initiatives, the National Initiative for Cyber Security Education (NICE) has published several initiatives in regard to protecting national security. The following document titled, “National Initiative for Cybersecurity Education”, located at , will be used to help you complete the assignment.
Write a three to five (3-5) page paper in which you:
Examine the National Initiative for Cyber Security Education and describe the initiative.
Assess the value of the NICE framework. Discuss the importance of this framework in regard to the security profession and individual organizations.
Suggest three (3) examples that illustrate the importance of the National Initiative for Cyber Security Education initiative.
Describe the expected outcomes of this initiative.
Evaluate how organizations can implement the NICE framework to prevent internal and external attacks.
Determine how the NICE framework addresses the legal and ethical issues in the field of information security.
Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Evaluate and explain from a management perspective the industry-standard equipment, tools, and technologies organizations can employ to mitigate risks and thwart both internal and external attacks.
Describe the legal and ethical issues inherent in information security.
Use technology and information resources to research issues in security management.
Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions.