1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonja [21]
3 years ago
11

Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager

of the information technology (IT) security department, you were asked by your boss to present a summary of what the organization should do to prevent this from happening again.
Explain the goal of information security in relation to mobile devices.

Identify the three sources of threats, provide a summary of each, and provide at least one example of each.

Explain technical safeguards, and discuss which technical safeguard(s) should be used for mobile devices.

Explain data safeguards, and discuss which data safeguard(s) should be used in this type of scenario.

Explain human safeguards, and discuss which human safeguard(s) should be implemented.

Discuss why the organization needs an incident response plan to secure information and knowledge.
Business
1 answer:
Cloud [144]3 years ago
3 0

Answer:  Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data .This is the presentation of the summary of what the organization should do to prevent this from happening again.

Explanation:

The <u>objective of information security i</u>s to maintain a reasonably secure environment as well as the proper use of resources and risk management, in order to preserve the availability, integrity and confidentiality of information and the assurance of business continuity. Also :

  • To manage information security risks to keep them at acceptable levels.
  • Protect information assets.
  • Train public servants, suppliers and stakeholders about the importance of data protection.
  • Monitor compliance with information security requirements.
  • Implement corrective and improvement actions.

Since the current trend is that <em>employees take their personal devices to the office,</em> in addition to giving them personal use, the most common is that they use it for the <em>review of corporate email and as support for the tasks of their daily work.</em> Therefore, proper management of the devices that are connected must be defined, in order to use the applications and information according to the provisions of the policies established by the company.

The most common threats are :

  1. Unofficial applications. (Can ask you for permitions and steal your private information)
  2. Public WIFI.(Can enter in to your network and steal your private information)
  3. Phising.(The most common is an email that force you to open a message which links to a malicious website to steal your personal information)

Always is important to protect the device with one or several of this advices:

  • Secure access networks.
  • Access to information must be restricted in a way that guarantees that only those people who are really qualified to do so can access the information.
  • Write a security policy. Define which devices can access corporate information.
  • Protect WiFi connections.
  • Protect against malware.

In this scenario the <em>company should </em>make an update of all information and networks ,the installation and configuration of firewalls and encryption of corporate confidential information.  

The best way is to train and make the employees of the company aware of the risk of sharing information and the legal punishment that they can have if they do it.

Every company must have a standardized risk plan to solve these types of situations before more information is leaked(can apply some of those mentioned above).

You might be interested in
Dehnert Midwifery's cost formula for its wages and salaries is $2,030 per month plus $409 per birth. For the month of May, the c
notsponge [240]

Answer:

The Answer is A. $47,838.

Explanation:

8 0
3 years ago
By observing an individual’s behavior in the situations outlined below, determine therelevant income elasticities of demand for
vfiekz [6]

Answer:

Normal goods are those goods which see their demand rise when income rises and fall when income falls. Inferior goods on the other hand will see their demand fall when income rises and vice versa.

a. Book = Normal Good

Coffee = Neutral good

The demand for Books increased when Bill had more money which makes it a normal good.

The demand for coffee did not change when new income came thereby making it a neutral good.

b. Book = Normal Good

Coffee = Inferior good

The demand for Books decreased when Bill had less money which makes it a normal good.

The demand for coffee increased when Bill's income reduced thereby making it an inferior good.

c. Book = Normal Good = Coffee

Both coffee and books are normal goods because Bill is buying less of them when their prices increase because it means that Bill has less income to spend on them.

d. More information needed.

We are unable to tell which goods are normal or inferior as we are not given information on the relative changes in demand as a result of income changing.

5 0
3 years ago
Mint Co.'s cash balance in its balance sheet is $1,300,000, of which $300,000 is identified as a compensating balance. Additiona
Natasha2012 [34]

Answer:

Correct option is B Yes and Yes

Yes - Compensating shall be reported, And Restricted shall also be reported.

Explanation:

Compensating balance is the minimum balance to be maintained in the company's bank account as this is used by bank for offsetting loan, and used by company to set up the loan amount.

Restricted balance is a choice made by the company to not use the funds and use it later for company's growth or future projected, but still since it cannot be used it shall also be reported accordingly.

Therefore the company has the need to report such restricted balance also and compensating balance has to be reported as well.

Therefore correct option is B

Yes - Compensating shall be reported, And Restricted shall also be reported.

7 0
4 years ago
Which is the following is a good way to control anger in the workplace
pochemuha

When you are at work, and you get angry on something, you need to do some anger control therapies.

Anger control therapies include, Deep breathing, counting from 1 to 10, slowly repeating a calming phrase in your mind, listen to your favorite music, take a short break, talk to your friend on work, drink water, use a stress relief toy, try to relax your muscles, etc.

These therapies will help you control your anger at work.

8 0
4 years ago
In the United States, many local communities provide public libraries and parks. This is an example of a local government fullin
Elena-2011 [213]
A.) is your answer I do believe

7 0
4 years ago
Read 2 more answers
Other questions:
  • Which process helps ensure return on investment from sports marketing?
    7·2 answers
  • Mirabile Corporation uses activity-based costing to compute product margins. Overhead costs have already been allocated to the c
    13·1 answer
  • One policy response to the u.s. economic slowdown of 2001 was tax cuts. this policy response can be represented in the is–lm mod
    8·1 answer
  • A new accountant at Leftwich Inc. is trying to identify which of the amounts shown below should be reported as the current asset
    6·1 answer
  • The owner of a local cinema is considering two alternative plans for renovating and improving his theater. Plan A calls for an i
    13·1 answer
  • The PRIMARY function of banks in the United States is to
    6·1 answer
  • At a price of $100, Beachside Canoe Rentals rented 11 canoes. When it increased its rental price to $125, 9 canoes were rented.
    14·1 answer
  • Say we change the ceteris paribus assumption to allow each employee to be more productive. For example, we add a zero-cost manag
    9·1 answer
  • 3. Suppose that there are 10 million workers in Canada and that each of these workers can produce either 2 cars or 30 bushels of
    8·1 answer
  • DISCUSS WHY WE NEED BANKS IN THE FINANCIAL SYSTEM?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!