Reference no: EM132580823
Assignment -
Paper Instructions - This is a short paper that requires you to study the provided scenario, research its questions/problems, and provide analysis and recommendations.
SCENARIO - Good morning. Your mission, should you choose to accept it, is to analyze and recommend policies that mitigate two data-breach attack vectors as discussed in this briefing, for a large multi-national corporation (the Company).
Your cover is that you have just been hired as an Information Security Engineer (ISE). The Company has suffered multiple data breaches that have threatened trust in the Company. The Company's reputation is at peril unless there is immediate action to resolve these breaches.
This confidential data includes financial information and personally identifiable information (PII) for corporations and private citizens. CNBC reports that 15.4 million consumers were victims of identity theft or fraud in 2018 at an economic cost in excess of $16 billion dollars US.
Two attack profiles have been identified:
Infiltration of the network through a vulnerable wireless connection within the organization; and
An inside job where PII data was stolen as a result of weak access controls.
Currently, the Company does not have policies that address these two vulnerabilities. Your mission is to develop a risk-management policy that addresses the two security breaches and describes how to mitigate these risks. Good luck!
REQUIREMENTS - Use a three-paragraph format: an introduction/scenario recap, analysis, and conclusion. Provide an APA style reference page with at least two references. 500 word minimum, not including your name, title, or references.
Develop simple innovative framework for business concept
: Develop a simple innovative framework for a business concept of your choice using the five (5) key questions (what, when, where, who, how).
|
Describe responsibilities of a cmo in today job market
: Select one successful CMO from a Fortune 500 company and explain what you found impressive about that person's approach to the CMO role
|
What valuable functions can brands perform for a firm
: How it changes their response to marketing, there are two basic approaches to measuring brand equity. Briefly, describe each of these approaches.
|
Socially responsible
: Describe a company /organization that has failed the public in some way - in other words, they were not socially responsible. Briefly explain why
|
Analyze policies that mitigate data-breach attack vectors
: Analyze and recommend policies that mitigate two data-breach attack vectors as discussed in this briefing, for a large multi-national corporation (the Company)
|
How current research ethics have developed
: Explain why and how current research ethics have developed, as well as what ethical concerns have emerged. How have been addressed and regulated.
|
How favorite brand has gained market share
: Describe how your favorite brand has gained market share and popularity in terms of its brand recognition, brand strategy, and product positioning.
|
Find how consumers attitudes form and change
: To understand the impact of learning and memory. Determine how consumers attitudes form and change (persuasive actions by the company)
|
How would go about monitoring the force and tracking insight
: How would go about monitoring the force and tracking the insights that you collect as part of your environmental-scanning process?
|