Reference no: EM132398279
Assignment: Instructions: Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data.
As the manager of the information technology (IT) security department, you were asked by your boss to present a summary of what the organization should do to prevent this from happening again. Create a PowerPoint presentation of your summary. In your PowerPoint presentation, you should include the components listed below.
• Explain the goal of information security in relation to mobile devices.
• Identify the three sources of threats, provide a summary of each, and provide at least one example of each.
• Explain technical safeguards, and discuss which technical safeguard(s) should be used for mobile devices.
• Explain data safeguards, and discuss which data safeguard(s) should be used in this type of scenario.
• Explain human safeguards, and discuss which human safeguard(s) should be implemented.
• Discuss why the organization needs an incident response plan to secure information and knowledge.
Your presentation must be a minimum of six slides in length, not counting the title and reference slides. Be sure that any graphics used are appropriate and support the content of your presentation. You must use at least two references in your presentation, and they should be cited and referenced in APA format. Please cite all sources used.
Assume person accidentally picks up credit card
: Assume a person accidentally picks up a credit card that is not theirs and uses the card in several instances.
|
What will be the mortgage balance remaining on a loan
: What will be the mortgage balance remaining on a loan of $ 215,295 with a 31-year term (monthly compounding) and k = 0.054
|
What was wallace total long-term debt in 2016
: What was Wallace's total long-term debt in 2016? Do not round intermediate calculations. Round your answer to the nearest dollar.
|
Professional legal issues with medical-nursing professionals
: Analyze the major professional roles played by physicians and nurses as they apply to physicians' conduct in medical arena and to nurses in role of adjuncts
|
Explain the goal of information security
: Explain the goal of information security in relation to mobile devices. Identify the three sources of threats, provide a summary of each, and provide at least.
|
What is the npv of each project
: What is the NPV of each project? Which projects should Xia undertake and how much cash should it retain?
|
Calculate the gross profits for the three years
: If the cost of Goods sold for the same years were respectively $70,000,000, $150,000,000 and $300,000,000. Calculate the Gross profits for the three years.
|
Describe preservation and collection of firearms evidence
: You are on a team of crime scene investigators. Your team was instructed to collect the physical evidence at a crime scene. Arriving at the crime scene your.
|
Management functions and responsibilities
: What are the management functions and responsibilities within a restaurant or bar? How does the success of the restaurant or bar rely on each person's function
|