Information Technology > CASE STUDY > SEC 280 Week5 Case Study Principles of Information Systems Security (All)

SEC 280 Week5 Case Study Principles of Information Systems Security

Document Content and Description Below

SEC 280 Week5 Case Study Principles of Information Systems Security Case Study: You have just been hired as an Information Security Engineer for a large, multi-international corporation. Unfor... tunately, your company has suffered multiple security breaches that have threatened customers' trust in the fact that their confidential data and financial assets are private and secured. Credit-card information was compromised by an attack that infiltrated the network through a vulnerable wireless connection within the organization. The other breach was an inside job where personal data was stolen because of weak access-control policies within the organization that allowed an unauthorized individual access to valuable data. Your job is to develop a risk-management policy that addresses the two security breaches and how to mitigate these risks. Risk Management Policy Background In recent past, the company has suffered multiple security breaches that have threatened customers' trust in the fact that their confidential data and financial assets are private and secured. Credit-card information was compromised by an attack that infiltrated the network through a vulnerable wireless connection within the organization. The other breach was an inside job where personal data was stolen because of weak access-control policies within the organization that allowed an unauthorized individual access to valuable data. Purpose: This risk management policy intends to address this and all other past occurrences and also mitigate any future occurrence. The two main purposes will be as follows: - Seek to identify, reduce and prevent undesirable incidents or outcomes, and - To review past incidents and implement changes to prevent or reduce future incidents. By definition, we will refer to Risk as the probability of an event and potential consequences associated with that event’s occurrence. Completely eliminating risk from an activity or set of activities is like relating to the saying that "the safest ships are the ones that do not sail, but that is not what they are designed for". This attests to the fact that Risk is inherent to any activity and while it is impossible to entirely eliminate it from the activity, it is the norm to manage it. For this policy, we will consider a risk as major or significant when the combination of an event’s probability and the potential consequences is likely to:  Impair the achievement of the organization’s strategic goal or objective;  Result in substantial financial costs that may jeopardize the organization’s core mission;  Create significant damage to the organization’s reputation. [Show More]

Last updated: 2 years ago

Preview 1 out of 7 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$12.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

80
0

Document information


Connected school, study & course


About the document


Uploaded On

Sep 04, 2021

Number of pages

7

Written in

Seller


seller-icon
QUIZ HERO

Member since 3 years

0 Documents Sold

Additional information

This document has been written for:

Uploaded

Sep 04, 2021

Downloads

 0

Views

 80

Document Keyword Tags

Recommended For You

Get more on CASE STUDY »

$12.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·