Explain the goal of information security

Assignment Help Other Subject
Reference no: EM132398279

Assignment: Instructions: Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data.

As the manager of the information technology (IT) security department, you were asked by your boss to present a summary of what the organization should do to prevent this from happening again. Create a PowerPoint presentation of your summary. In your PowerPoint presentation, you should include the components listed below.

• Explain the goal of information security in relation to mobile devices.

• Identify the three sources of threats, provide a summary of each, and provide at least one example of each.

• Explain technical safeguards, and discuss which technical safeguard(s) should be used for mobile devices.

• Explain data safeguards, and discuss which data safeguard(s) should be used in this type of scenario.

• Explain human safeguards, and discuss which human safeguard(s) should be implemented.

• Discuss why the organization needs an incident response plan to secure information and knowledge.

Your presentation must be a minimum of six slides in length, not counting the title and reference slides. Be sure that any graphics used are appropriate and support the content of your presentation. You must use at least two references in your presentation, and they should be cited and referenced in APA format. Please cite all sources used.

Reference no: EM132398279

Questions Cloud

Assume person accidentally picks up credit card : Assume a person accidentally picks up a credit card that is not theirs and uses the card in several instances.
What will be the mortgage balance remaining on a loan : What will be the mortgage balance remaining on a loan of $ 215,295 with a 31-year term (monthly compounding) and k = 0.054
What was wallace total long-term debt in 2016 : What was Wallace's total long-term debt in 2016? Do not round intermediate calculations. Round your answer to the nearest dollar.
Professional legal issues with medical-nursing professionals : Analyze the major professional roles played by physicians and nurses as they apply to physicians' conduct in medical arena and to nurses in role of adjuncts
Explain the goal of information security : Explain the goal of information security in relation to mobile devices. Identify the three sources of threats, provide a summary of each, and provide at least.
What is the npv of each project : What is the NPV of each project? Which projects should Xia undertake and how much cash should it retain?
Calculate the gross profits for the three years : If the cost of Goods sold for the same years were respectively $70,000,000, $150,000,000 and $300,000,000. Calculate the Gross profits for the three years.
Describe preservation and collection of firearms evidence : You are on a team of crime scene investigators. Your team was instructed to collect the physical evidence at a crime scene. Arriving at the crime scene your.
Management functions and responsibilities : What are the management functions and responsibilities within a restaurant or bar? How does the success of the restaurant or bar rely on each person's function

Reviews

Write a Review

Other Subject Questions & Answers

  Describe a business that you may own some day

Describe a business that you may own some day or that you currently own. (Even if you never plan to own a business, pretend as if you will do.

  Matching law tells us about choice behavior in humans

Examine what the theoretical matching law tells us about choice behavior in humans. Give an example to illustrate this.

  Flashblub memories-pros and cons

In brief what does research suggest about the pro and cons of flashblub memories relating to the 911 event.

  Conduct research to find cultures

Conduct research to find cultures different from your own in terms of beliefs and practices related to death and dying.

  Analyze the influence of critical approache in decisions

One of the most influential modern views of legal theory is the critical approaches to law, which include: Critical Legal Studies, Feminist Legal Theory.

  How can benchmarking assist the supervisor

HES3750 Management Skills for the New Healthcare Supervisor. How can benchmarking assist supervisor in determining whether a staff reduction may be necessary

  Affect slaves relationship to christianity

What was the African slaves' initial introduction to the Christianity of the white person and how did this affect slaves' relationship to Christianity?

  What do you see the demand curve being for apple video

What do you see the demand curve being for Apple Video Ipads for the next 3-year period in the United States?

  Health disparities in underdeveloped countries

How has international culture led to health disparities in underdeveloped countries? For example, the introduction of fast food globally leading to diabetes, etc.

  What is the most critical information communicated in video

What is the most critical information communicated in the video?, What is the evidence (offer examples).  Describe at least two theories that apply to the information presented in video

  Describe the major components of transformational leadership

Describe the major components of transformational leadership. Discuss the criticism, or weaknesses, of transformational leadership.

  Write a script for podcast on why having a pet is good

Write a script for podcast on why having a pet is good for your mental health. Include research on emotional support pets and how dogs can feel

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd