Coordination between the it and hr departments

Assignment Help Basic Computer Science
Reference no: EM131349656

Employees are often the greatest security threat to an organization. It may be a disgruntled employee who felt he or she was poorly treated or a model employee who simply didn't follow company policy for keeping his or her computer secure.

The case study about coordination between the IT and HR Departments from your textbook in this unit's Learning Resources covers this type of security threat. This case involves a mid-size company with a sophisticated information infrastructure. The director of IT is new, and the head of human resources has been with the organization for some time. As the new IT director begins implementing additional security measures, a security breach occurs.

For this Assignment, you will analyze the above case study from this unit's reading and consider employee behavior, preparation for and prevention of security breaches, and appropriate communication with employees after attacks.

Submit a 2- to 4-page analysis in APA format of the case study. In your analysis, answer the following:

  • 1. What about employee awareness and/or mindset may have led to the breach?
  • 2. What steps might management have taken to prepare for or prevent this breach?
  • 3. Based on your understanding about the attacker and the work environment, how might the company ward off future attacks?
  • 4. What information might the company communicate to its employees about the attack?

CASE STUDY

https://www.jite.org/documents/Vol11/JITEv11IIPp085-096Ayyagari1035.pdf

Reference no: EM131349656

Questions Cloud

Asciidoctor with the asciidoctor gradle plugin : Converting an AsciiDoc to PDF and HTML5 using Asciidoctor with the Asciidoctor Gradle plugin. SO I changed the CSS in the code it only updated in the pdf not the HTML5 looking for some help from the experts out there to see if you can help me get ..
What do you want to get out of course : What are some of the types of projects that you are interested in and what do you want to get out of this course? What are some risks of the project development process you might encounter and what can you do to mitigate or avoid the problems?
What are some other alternatives for resolving the problem : NRS-437V:ACME Medical Center has been damaged seriously by a recent hurricane. A helicopter that is trying to rescue people stranded by the hurricane has crashed, hitting the wing of the building where the pediatric unit was located. In the midst ..
Research process for decision-making when purchase computers : BIS/221- Develop a 1,050-word summary describing your chosen process to decide between multiple computer purchase options. Research processes for decision-making when purchasing new computers. Use an Internet search engine.
Coordination between the it and hr departments : The case study about coordination between the IT and HR Departments from your textbook in this unit's Learning Resources covers this type of security threat. This case involves a mid-size company with a sophisticated information infrastructure.
Responsibilities for implementing an sap : Please help (information technology question) the roles and responsibilities for implementing an SAP at your fictitious company. Include the following:
Develop the stiffness matrix and forcing vector : In a double pipe heat exchanger, hot fluid flows inside a pipe and cold fluid flows outside in the annular space. The heat exchange between the two fluids is given by the differential equations
To what extent do they meet this obligation : NRS-437V:Health care providers are obligated to provide for those entrusted in their care. To what extent do they meet this obligation? How might their obligation to others conflict with their obligation to themselves?
What is a survey : What is a survey? Describe some research questions you might address with a survey.- What are some factors to take into consideration when constructing questions for surveys.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Different department and supervisor names

Write an application that stores at least five different department and supervisor names in a two-dimensional array. Allow the user to enter a department name (such as"Marketing") and display the corresponding supervisor's name. If the department ..

  Ideal vacation spot based on a user name

Please find the sample program in the Solution, that uses Java's built in ArrayList to pick an ideal vacation spot based on a user's name. Update the code below to use the generic ArrayManipulator user-defined module that you implemented instead o..

  What is the hit ratio taking in to consideration

What is the average access time of the system for both read and write requests.

  Can anybody give me a snippet or a little guide

I need to calculate the hash of the file that its path is stored in fpath variable.I think it can be done via GetHashCode. Can anybody give me a snippet or a little guide?

  About tdma-fdma-cdma

Write a one page paper comparing the advantages of Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Code Division Multiple Access (CDMA), and Orthogonal Frequency Division Multiplexing, as used in wireless mobile co..

  Summarizing the capability and features

Prepare a research report in which you will summarize and present what you have learned about Network Management Systems (NMS), and their network monitoring capability. Prepare a research report summarizing the capability and features of three well..

  Snippet of code allows the user to input

This snippet of code allows the user to input two integers and then divides them. Unfortunately, it is error prone (ie allows a divide by zero error) and does not give the user much feedback when the two numbers are not evenly divisible.

  Create a complete alternative css style

The topic of your site can be any of your choosing. Pick something you have an active interest in, a hobby, a sport you play, a group or club you belong to, or any similar topic. Once you have selected your topic YOU MUST CONFIRM THIS WITH YOUR TU..

  Write pseudo code for an iterative algorithm

Write pseudo code for an iterative algorithm that determines a DFS spanning tree for an undirected graph.

  Regards to network security

With regards to network security, and specifically IP Security, At which layers of the network stack architecture should a solution be attempted? Provide details

  Dmz zone in a businesses

Should there be a DMZ zone in a businesses so staff can access their personal email, social media? Name four reasons why.

  Perform clustering efficiently under kinds of constraints

Categorize the kinds of constraints that can be imposed on the clusters produced and discuss how to perform clustering efficiently under such kinds of constraints.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd