How should fox lake respond to this incident

Assignment Help Management Information Sys
Reference no: EM131817000

Collaborate with students on the following exercise. In particular, consider using Google Docs, Windows Live SkyDrive, Microsoft SharePoint, or some other collaboration tool. Suppose the Chris and Jason, the groundskeepers at Fox Lake, are the same Chris and Jason that appeared in the Guide on pages 140-141.

After Chris was fired from his job, he wandered around, couldn't find professional work, and settled for cutting the grass at Fox Lake. He happened to tell Mike about his computer knowledge the day before Anne made her request for a report on membership data (see Chapter 9, pages 284-285). Mike thought giving Chris that task would possibly help Chris's professional job prospects as well as solve a problem for Fox Lake. Jason was working at Fox Lake part time, and it was he who hatched the scheme to steal expensive wedding presents.

Chris provided the data, and Jason did the stealing. Assume that the wedding events data and the membership data are stored in separate databases on the server in the facilities building. Access to both is protected via user account and password, but Mike leaves his passwords on his desktop computer monitor. The machines themselves are located in a backroom of the facilities building. Meeting with your group, answer the following questions:

1. In what ways did weaknesses in technical safeguards allow this situation to occur?

2. In what ways did weaknesses in data safeguards allow this situation to occur?

3. In what ways did weaknesses in human safeguards allow this situation to occur?

4. How should Fox Lake respond to this incident?

5. What security mistakes, if any, did each of the following make:

a. Anne

b. Mike

c. Jeff

d. Laura

6. If you were Jeff, how would you remedy the weaknesses you identified in your answers to questions 1-3?

7. Suppose you were on a job interview with the owner of a small business with IS systems and IT infrastructure similar to that of Fox Lake. If that owner were to ask you what the top three issues for IS security in a small business are, how would you respond?

Reference no: EM131817000

Questions Cloud

Compute the percentage total return : Suppose a stock had an initial price of $73 per share, paid a dividend of $1.20 per share during the year, Compute the percentage total return
Weights in kilograms of boys : Weights in kilograms of boys at the start of 1st grade are approximately normal with mean 25, standard deviation 5. Use the 68-95-99.7
Comment on the ethical issues and choice points response : Comment on the ethical issues and Choice Point's response. Did Choice Point choose wisely? Consider that question from the viewpoint of customers.
Random variables is binomial : Tell whether each of these random variables is binomial; if not, tell which condition is not met (fixed sample size n, independence of selections
How should fox lake respond to this incident : In what ways did weaknesses in technical safeguards allow this situation to occur?How should Fox Lake respond to this incident?
Proportion of people do we expect : For any sample size, on average what proportion of people do we expect to have been born in the winter?
Proportion of high school seniors : If we take a sample of seniors from a particular private high school, can we say that sample proportion with no siblings has mean 0.05?
Find the mean and standard deviation : The binomial random variable X counts the number of married students in a random sample of high school seniors, where p 0.02 of all high school seniors are marr
Review your credit report for obvious errors : Review your credit report for obvious errors. However, other checks are appropriate. Search the Web for guidance on how best to review your credit records.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Features about windows 7 and windows 8

Read the article titled "The Windows XP upgrade question: Windows 7 or Windows 8?" You can also use the Internet or Strayer Library to research articles on features about Windows 7 and Windows 8

  What would be some of the benefits of having such technology

What would be some of the benefits of having such technology? More importantly, what would be the ramifications of this technology for the user and community?

  Technology solutions fail to meet business objectives

What happens when technology solutions fail to meet business objectives?

  What impact is vr making in the corporate world

What impact is VR making in the corporate world and Is it making any improvements in the corporate world.

  Which security area is addressed in ieee 802.11

Prior to cellular radio, mobile radio and telephone services required. The ideal design for cells in a cellular network is a hexagonal shape because.The Wireless Application Protocol (WAP) is. Which of the following is NOT one of the components o..

  This posting addresses fraudulent behavior in a software

this posting addresses fraudulent behavior in a software co.jason works at a new software development company. the

  Create slides that reinforce and illustrate your main ideas

For the body of your presentation, cover the main points of your report. Create slides that reinforce and illustrate your main ideas. Follow basic design principles for effective slide content.

  What is the bullwhip effect

What is the bullwhip effect? Why is it a problem for businesses - what was the catalyst for NIBCO to develop a VMI program, and why was it able to respond?

  Describe the advantages of atm to those of frame relay

Compare the advantages and disadvantages of ATM to those of frame relay. Recommend the superior technology and explain your rationale.

  Evaluate existing regulatory compliance tools and controls

Evaluate existing regulatory compliance tools and controls. Apply a regulatory compliance tool within a specific organization.

  Why is a search engine a big data application

Mention four possible functions that a BI Competency Centre (BICC) would serve within an organization, and give a brief description of each.List and describe three levels or categories of analytics that are most often viewed as sequential and inde..

  Consider a dedicated firewall device

Consider a dedicated firewall device. What is its major advantage when the target is throughput and security? Explain.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd