1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonja [21]
4 years ago
11

Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager

of the information technology (IT) security department, you were asked by your boss to present a summary of what the organization should do to prevent this from happening again.
Explain the goal of information security in relation to mobile devices.

Identify the three sources of threats, provide a summary of each, and provide at least one example of each.

Explain technical safeguards, and discuss which technical safeguard(s) should be used for mobile devices.

Explain data safeguards, and discuss which data safeguard(s) should be used in this type of scenario.

Explain human safeguards, and discuss which human safeguard(s) should be implemented.

Discuss why the organization needs an incident response plan to secure information and knowledge.
Business
1 answer:
Cloud [144]4 years ago
3 0

Answer:  Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data .This is the presentation of the summary of what the organization should do to prevent this from happening again.

Explanation:

The <u>objective of information security i</u>s to maintain a reasonably secure environment as well as the proper use of resources and risk management, in order to preserve the availability, integrity and confidentiality of information and the assurance of business continuity. Also :

  • To manage information security risks to keep them at acceptable levels.
  • Protect information assets.
  • Train public servants, suppliers and stakeholders about the importance of data protection.
  • Monitor compliance with information security requirements.
  • Implement corrective and improvement actions.

Since the current trend is that <em>employees take their personal devices to the office,</em> in addition to giving them personal use, the most common is that they use it for the <em>review of corporate email and as support for the tasks of their daily work.</em> Therefore, proper management of the devices that are connected must be defined, in order to use the applications and information according to the provisions of the policies established by the company.

The most common threats are :

  1. Unofficial applications. (Can ask you for permitions and steal your private information)
  2. Public WIFI.(Can enter in to your network and steal your private information)
  3. Phising.(The most common is an email that force you to open a message which links to a malicious website to steal your personal information)

Always is important to protect the device with one or several of this advices:

  • Secure access networks.
  • Access to information must be restricted in a way that guarantees that only those people who are really qualified to do so can access the information.
  • Write a security policy. Define which devices can access corporate information.
  • Protect WiFi connections.
  • Protect against malware.

In this scenario the <em>company should </em>make an update of all information and networks ,the installation and configuration of firewalls and encryption of corporate confidential information.  

The best way is to train and make the employees of the company aware of the risk of sharing information and the legal punishment that they can have if they do it.

Every company must have a standardized risk plan to solve these types of situations before more information is leaked(can apply some of those mentioned above).

You might be interested in
For the year ended December 31, Depot Max's cost of goods sold was $56,900. Inventory at the beginning of the year was $6,540. E
Gwar [14]

Answer:

D) 44

Explanation:

first we must calculate inventory turnover:

Average inventory = ($6,540 + $7,250) / 2 = $6,895

Inventory turnover = $56,900 / $6,895 = 8.25

days' sales of inventory = 365 / 8.25 = 44.2 ≈ 44

Days' sales of inventory is the average number of days that it should take to sell the inventory.

3 0
3 years ago
Invertebrates have a (an) ____ which provides a support framework.
andrew11 [14]
<span>Invertebrates is the largest group in the animal kingdom. 97 percent of all animals are invertebrates. Their main characteristic is that they </span>do not have backbones.<span>
Invertebrates have an </span>exoskeleton which provides a support framework.Exoskeleton<span> is an external anatomical feature that supports and protects the animal's body. </span>
8 0
4 years ago
Cushman company had $814,000 in sales, sales discounts of $12,210, sales returns and allowances of $18,315, cost of goods sold o
lesya692 [45]
When solving for the gross profit on a product use:
Gross profit = Sales - Cost of goods sold

Sales = $814,000
Cost of goods sold = $386,650

Gross profit = $814,000 - $386,650
Gross profit = $445,350
3 0
3 years ago
A companies profit motive benifits consumers by ensuring the products and services they need are aviable at a high quality
Brilliant_brown [7]

Answer:

A. The invisible hand

Explanation:

CHECK THE COMPLETE QUESTION BELOW

A company's profit motive benefits consumers by ensuring the products and services they need are available at a high quality. what is this describing?

A. The invisible hand

B. Mixed economy

C. Laissez-faire

D. Private enterprise

The invisible hand can be regarded as a metaphor used in describing the unseen forces which is responsible for movement of the free market economy. With freedom of production as well as individual self-interest and consumption, we can fulfill best interest of society. This is a concept by Adam Smith. For instance, A company's profit motive benefits consumers by ensuring the products and services they need are available at a high quality, describe invisible hand.

8 0
3 years ago
In preparing financial statements, accountants should consider all of the following except: a. The objectives of financial repor
AlexFokin [52]

Answer:

D. The presentation of the value of a company

Explanation:

The company's values, corporate values or core values, has no place in the financial statement.

The corporate values includes the fundamental beliefs upon which ones business and its ethic/behavior are based.

8 0
3 years ago
Other questions:
  • Gary is the marketing manager for an automobile dealership. His boss tells him the firm's primary goal is to increase its local
    6·1 answer
  • Identify the three criteria you consider to be most important in determining whether or not a system is a quality system. Briefl
    13·1 answer
  • What is the cost for the 5% highest domestic airfares? (rounded to nearest dollar)?
    6·1 answer
  • Mark's Manufacturing's average age of accounts receivable is 45 days, the average age of accounts payable is 40 days, and the av
    11·1 answer
  • FedEx Corp. stock ended the previous year at $113.39 per share. It paid a $0.40 per share dividend last year. It ended last year
    5·1 answer
  • Which of the following statements is correct?a. A hostile takeover is a primary method of transferring ownership interest in a c
    10·1 answer
  • If $1,000 is deposited in a certain bank account and remains in the account along with any accumulated interest, the dollar amou
    10·1 answer
  • A suggested project requires initial fixed assets of $227,000, has a life of 4 years, and has no salvage value. Assume depreciat
    10·1 answer
  • According to Ken Guest's research on Chinese restaurants in the United States, the network of services, businesses, and smuggler
    15·1 answer
  • In the market for loanable funds, the effect of an increase in the profitability of new investment would be?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!