Business > CASE STUDY > R C843 Task 1.docx C843Managing Information Security KOP1 TASK 1: Analysis Response Tab (All)
R C843 Task 1.docx C843Managing Information Security KOP1 TASK 1: Analysis Response Table of Contents A. Exploited Vulnerabilities3 B. Confidentiality, Integrity, and Availability4 C. Federal Re... gulations5 D. Impact Mitigation6 E. Incident Response6 F. Compliance with Federal Regulations7 G. Technical Controls8 H. Organizational Structure8 I. Risk Management9 J.Citations11 A: Exploited Vulnerabilities After careful review, there were a number of identified reasons why the attack on Azumer Water was successful. Overall, Azumer Water did not adhere to an adequate level of security hygiene nor did they follow the recommended industry security best practices. More specifically, Azumer Water did not implement any sort of end user training such as Security Awareness Training and Education (SATE). This lack of training pair. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [Show More]
Last updated: 2 years ago
Preview 1 out of 14 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Aug 20, 2021
Number of pages
14
Written in
This document has been written for:
Uploaded
Aug 20, 2021
Downloads
0
Views
169
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·