Identify the risks of using job sites like LinkedIn for professionals, and the implications that arise when posting their security clearance.

Instructions:

Identify the risks of using job sites like LinkedIn for professionals, and the implications that arise when posting their security clearance. Examples could be espionage by foreign countries, blackmail, and the possible theft of data/information on important industry or trade secrets. In narrative form, identify the threats, vulnerabilities, and recommended countermeasures related to a specific technology and/or organization.

There are several ways to go about this, but let me recommend two logical paths;

You are the director of risk for a large organization and you are thinking of implementing or adopting a novel technology. The technology is very popular and there is a significant buzz surrounding it because of the benefits it brings about. However, it is relatively new and therefore untested. You are charged with conducting a risk analysis to weigh the costs (both monetary and risk-based) vs. the benefits (perhaps efficiency, reaching new markets, etc.). See Sample A for additional guidance.

You are a risk consulting firm hired by a newly appointed CISO. His or her organization never really worried about security and they have never had any type of formal study performed. You are tasked with identifying the threats posed to their company (both general and industry-specific), the vulnerabilities (specific to their information assets) and the countermeasures they should employ to improve their posture.

The end result of this assignment should be a 7-10 page paper (including any narrative, spreadsheets, visual aids, etc.) that effectively communicates the technical and non-technical data necessary to help the end-user gain a comprehensive understanding of the risks they face and clear recommendations going forward. The best papers will contain items such as threat matrices (See Sample B for additional guidance) and perhaps the annotated results of something like a Nessus scan to document technical vulnerabilities (See Sample C for additional guidance). Additional credit will be given to those who tie their findings to existing standards.

The reference section is to be in APA format. Note that in my sample, references have been removed….. your papers will require a reference section and references should be abundant and of high quality.

Links to get started:

http://www.globalsecurity.org/military/library/news/2002/06/mil-020607-usn02.htm

https://www.google.com/search?q=qualitative+risk+assessment+template&ei=GoV_VaHCEsTWoAT15YPQBQ

Risk assessment of using LinkedIn

http://www.topsecretwriters.com/2010/02/is-it-ok-to-publicize-secret-security-clearance/

How to Highlight Your Security-Cleared Skills on Your Resume, Without Revealing Classified Information

http://m.nsa.gov/public_info/_files/resumeDosDonts.pdf

http://www.dol.gov/vets/tap/F-TAPSupplement-CreateanEffectiveResume8.9.07.pdf

Fake LinkedIn Recruiter Nabs Personal Data from Top Secret Clearance Holders

LinkedIn by the Numbers – Searching by Title and Clearance

http://www.militarytimes.com/story/veterans/careers/civilian/get-hired/2015/01/20/cyber-pay-bump-how-to-make-your-clearance-work/22048271/

http://america.aljazeera.com/articles/2014/5/29/nsa-contractors-linkedinprofiles.html

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]