1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alja [10]
3 years ago
15

There are several steps in Information Risks planning. How can you utilize these steps to create a "Security Data Policy for emp

loyees storing personal data on their work computers." Describe how you will use each step. Will you need to use all the steps, if not what steps would be eliminated and why
Social Studies
1 answer:
Mariana [72]3 years ago
5 0

Answer: among the many steps in information risk planning, below are the 5 basic steps:

• STEP 1: Identify the risk

• STEP 2: Analyze the risk

• STEP 3: Evaluate or rank the risk

• STEP 4: Treat the risk

• STEP 5: Monitor the risk.

I WILL NOT CONSIDER STEP THREE, BECAUSE I SEE ALL RISK TO BE THE SAME, THE ONE YOU ASSUME TO BE A HIGH RISK MAY NEVER OCCUR, WHILE THE ONE YOU ASSUME TO BE A LOW RISK MAY OCCUR FREQUENTLY. SO I WILL GIVE EQUAL ATTENTION TO ALL RISK IDENTIFIED.

In using this steps I have to take is orderly.

FIRST STEP: identifying the risk, in this first step I will have to identify all the risk that are involved in information security, which could be data lost from a computer or data theft from a personal computer.

SECOND STEP: Analyse the risk. I will study easy risk, how can data be stolen from an employee personal work computer, and how can data be lost from an employee work computer. To analyze this risk, data can be lost from an employee computer, if the system has been corrupted by a virus, if the system hard disc crash, if the system was mistakenly formated, and if the system is poorly maintained. Data can be stolen from a system if the system is been hacked, if the system has no password, and by stealing the hard disc in the system.

THIRD STEP: Evaluate or rank the risk. This is where you evaluate each risk, to know the high risk and the low risk, and to know the level of precaution to be used. I will not consider this step because I believe all risk are high and anyone can occurs any day, so the chance of all risk is the same, and the level of precaution to be taken in all risk should be the same.

FOURTH STEP: Treat the risk. In this step I will treat all the risk I discovered in the second step. For data security in terms of theft, special security code will be generated for all employee computer, which will be known only by the employee who use the computer. All staff are meant to leave the office when working hours is over, or work with the security personnel if the staff works overtime, to avoid theft of hard disc. Staffs will be educated to avoid clicking links from an unknown source, to avoid been hacked. For data security in terms of lost. All staff will back up their files in a cloud. All staff will be educated on the usage of computers to avoid formating the system by mistake. They will be an updated anti virus, to quarantine the system from virus, which can damage data.

FIFTH STEP: Monitor and review the risk. The risk will be monitored constantly, by updating virus always, changing of password to each system at least once in a month, monitoring each staff usage of the computer, updating the IT unit with recent technologies and softwares, updating the security on their duties. As the risk is been monitored, I will watch out for more risk to be identified.

You might be interested in
Find the particular solution that satisfies the initial condition. (Enter your solution as an equation.)
katovenus [111]

Answer:

The question is not complete has some details are missing. I have however attached a similar question for the differential equation, you can use the same approach for any DE.

Explanation:

Solution of differential equation was aplied to get the particular solution, the details and appropriate steps is as shown in the attachment.

5 0
2 years ago
Which of the following is an example of a folkway? Rules structuring religious rites of passage, such as ordainment into the pri
vampirchik [111]

Answer: <em>Expectations about personal space while riding an elevator.</em>

Explanation:

Folkways are generally referred to as the conventions or customs of daily life. They are known as a kind of social norm. Under the discipline of sociology, folkways are usually referred in context to mores since they tend to act as both kind of social norms, although they tend to vary in degree to which these are implemented and enforced. Folkways are referred to as casually implemented social expectations, whereas mores are referred as beliefs about behaviors which are strictly upheld.

5 0
2 years ago
Leading researcher Charles Nelson proposed the view that, although adolescents are capable of very strong emotions, their prefro
Nadusha1986 [10]

Answer: Social developmental neuroscience

Explanation:  

 Social developmental neuroscience is is one of the psychological concept that helps in understanding the biological system and concepts such as genetic mechanism and the cellular concepts.

 The social development neuroscience also describe about the various types of interpersonal social behavior of the person by refining various types of theories and concepts.

According to the given question, Charles nelson views basically reflect about the emerging field of the social developmental neuroscience connection between the cognitive and the brain process.

 Therefore, Social developmental neuroscience is the correct answer.

8 0
3 years ago
Which person is LEAST likely to be in a group with the other three?
Ivahew [28]

Answer:

D: Lauren, because she's liberal and single.

6 0
3 years ago
explain the relation between unconditional positive regard and conditions of worth in the dvelopment of a healthy self
lisabon 2012 [21]

People who have a higher feeling of their own worth are more assured and driven to work toward self-actualization because they have a greater sense of self-worth and confidence in their ability to achieve their goals.

<h3>How do positive esteem and characteristics of worth relate?</h3>

When a significant other's approval is conditional, when the person feels valued in some ways but not in others, there is a condition of worth.

<h3>How may the idea of constant positive respect assist someone in growing into having a healthy personality?</h3>

A client may be more inclined to open up to the therapist about their ideas, feelings, and actions if you have this attitude toward them.

<h3>Do you believe that a healthy personality development requires unconditional favorable regard?</h3>

We are invited to carry out our ideals fearlessly by extending ourselves toward self-compassion and unconditional positive respect. Unconditional positive regard is sometimes mistaken for "feel good" psychotherapy, but research demonstrates that the technique can actually boost self-motivation, self-assurance, and authenticity.

learn more about unconditional positive regard here <u>brainly.com/question/7618923</u>

#SPJ4

4 0
1 year ago
Read 2 more answers
Other questions:
  • What countries fought for independence from their European rulers
    10·1 answer
  • Which of the following is NOT a defense mechanism?
    14·1 answer
  • is there statistically significant evidence that a larger proportion of women than men favor stricter gun control laws? g
    11·1 answer
  • The nurse is explaining to parents that the preschooler's developmental task is focused on the development of initiative rather
    13·1 answer
  • What artifact makes historians think the Shang had some contact with civilizations to their West?
    5·1 answer
  • How did ancient Greece differ from sparta
    7·2 answers
  • Which measure of memory retention is the most useful for assessing the strength of an implicit memory?
    10·2 answers
  • PLEASE HELP ASAP!!<br> Look at the file..
    15·2 answers
  • a ________ offers an item for free or at a bargain price to reward some type of behavior, such as buying, sampling, or testing.
    12·1 answer
  • The risk of hypovolemic shock is high with acute mesenteric arterial insufficiency because:_______
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!