Business > CASE STUDY > IT 335 Milestone 6.docx IT 335: Wilburs Widgets Security Policy Gap Analysis Southern (All)
IT 335 Milestone 6.docx IT 335: Wilburs Widgets Security Policy Gap Analysis Southern New Hampshire University Seven Domains of IT Infrastructure User Domain œThe weakest link in any security ... plan or implementation is a human. The weak links include everyone from the hourly paid end user to the owner of the company. (Thomason, 2013). At Wilburs Widgets, there is no formal security training provided to users. This makes the users an even bigger risk to the security of the companys information. Well trained users, while still a weak point, can spot anomalies and possibly prevent malicious attacks. At Wilburs Widgets, the change needs to start at the top with the CEO and Board of Directors. Without their buy-in, no security policies will lessen the threat posed by untrained users. The insider threat is also a huge risk to modern companies. Employees already have access to the companys information, so th. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [Show More]
Last updated: 2 years ago
Preview 1 out of 3 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Jun 15, 2021
Number of pages
3
Written in
This document has been written for:
Uploaded
Jun 15, 2021
Downloads
0
Views
86
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·