Reference no: EM132369269
Assignment: Instructions: Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your boss to present a summary of what the organization should do to prevent this from happening again. Create a PowerPoint presentation of your summary. In your PowerPoint presentation, you should include the components listed below.
• Explain the goal of information security in relation to mobile devices.
• Identify the three sources of threats, provide a summary of each, and provide at least one example of each.
• Explain technical safeguards, and discuss which technical safeguard(s) should be used for mobile devices.
• Explain data safeguards, and discuss which data safeguard(s) should be used in this type of scenario.
• Explain human safeguards, and discuss which human safeguard(s) should be implemented.
• Discuss why the organization needs an incident response plan to secure information and knowledge.
Your presentation must be a minimum of six slides in length, not counting the title and reference slides. Be sure that any graphics used are appropriate and support the content of your presentation. You must use at least two references in your presentation, and they should be cited and referenced in APA format. Please cite all sources used.
What might have caused the problems and potential solutions
: We all had the unfortunate experience of seeing how computers can, at times, make life's journey about more difficult. This is especially true in knowledge.
|
Design and implement a program that reads from the user
: CSE 1321 & CSE 1321L Programming & Problem Solving - Lab Assignment - Selection Structures, Kennesaw State University, Georgia
|
ERM in Practice at University of California Health System
: ERM in Practice at the University of California Health System. EVALUATION: Apply the concepts from the appropriate chapter.
|
Difference between privacy and infosec
: Definition of Privacy. Difference between Privacy and InfoSec, Threats to Privacy
|
Discuss which human safeguards should be implemented
: Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology.
|
Phases of decision making
: Identify the decision: We recently had an issue with the access to the reports to all the users from different teams.
|
What you found interesting about the agency
: In this Discussion, you will select a clinic or community agency within the community. The organization you select must serve the needs of a vulnerable.
|
Describe the history of public administration
: Write an 850- to 1,200-word paper in which you describe the history of public administration and briefly discuss the strengths and weaknesses
|
Identify the pathophysiology of acute and referred pain
: Identify the pathophysiology of acute, chronic, and referred pain. Consider the similarities and differences between these three types of pain.
|