The cost of inadequate controls

Assignment Help Basic Computer Science
Reference no: EM132716321

Assignment : The Cost of Inadequate Controls

Because you performed so well in the scenario for Assignment 1, upper management at LOTR Experience has consulted with you again as their IT Security Specialist. This time, they are concerned about a pressing new issue. They inform you about the high costs associated with creating a secure network environment. Unfortunately, they also explain that the IT budget is being cut by 30%. A recent request for permission to hire an additional IT member was denied. The proposed additional employee would have been dedicated to the database security controls. Finally, based on the budget constraints, a request for a new NAC Router was also denied.

Your task for Assignment 2 is to write an effective counter argument to convince upper management that inadequate controls would cost the company more if security vulnerabilities are exploited.

Write a counter-argument in which you address the following:

Analyze the annual loss of revenue by the professional sector as it relates to access control. (Summarize and provide this information in a graph)

After reviewing the LOTR Network Design artifacts, outline three critical areas of concern related to access control.

Outline the potential risks, vulnerabilities, and threats that could be incurred through the lack of a dedicated database security specialist.

Outline the potential risks, vulnerabilities, and threats that could be incurred through the lack of a NAC router.

Using the Internet, find three qualified vendors that support the need for an NAC router. Provide the companies and the industry knowledge that will support your argument.

Reference no: EM132716321

Questions Cloud

When an auditor notices evidence of a potential fraud : When an auditor notices evidence of a potential fraud while performing an audit, the auditor should? perform additional procedures to be able to conclude
What is the relationship between bodies and spaces : What is the relationship between bodies and spaces? How are they symbiotic?
Physical access control : Physical security is the oldest form of access control. These controls are layered throughout the organization, starting with facility controls.
Five titles of the americans with disabilities act : Briefly describe any two of the five titles of the Americans with Disabilities Act (employment, public services, public accommodations, telecommunications
The cost of inadequate controls : Because you performed so well in the scenario for Assignment 1, upper management at LOTR Experience has consulted with you again as their IT Security Specialist
Prepare the journal entries for the three years : An entity grants 150 share options to each of its 450 employees. Each grant is conditional upon the employee working for the entity for the next three years.
Why did you choose to help the immigrants : Why did you choose to help the immigrants as a social worker as a migrant ? What client population are you most interested in working with and why?
Which combinations is a good means of hiding employee fraud : Which combinations is a good means of hiding employee fraud but a poor means of carrying out management (financial reporting) fraud?
What is operational coordination during a disaster : What is operational coordination during a disaster?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What are base stations in wireless networking

What are base stations in wireless networking? What IEEE standards are used for wireless networking?

  Description of function of antivirus software-firewalls

Reasons why IDS would benefit the company and the larger cyber domain. A description of the function of antivirus software, firewalls, and IDS.

  Kids trade items in the school lunchroom

It is very difficult to find a pair of kids who each wants the others' food among hundreds of kids.

  Prepare the interface which has single method decode

Prepare the interface MessageDecoder which has single method decode(String cipherText) where cipherText is the message to be decoded.

  Information management differs from information governance

Write 3 paragraphs explaining 3 ways that records information management differs from information governance.

  Disrupted again in the future due to hurricane

Disaster Recovery and Business Continuity Scenario. Create short guide to keep business going if the power is disrupted again in the future due to a hurricane.

  Calculate mass of acetone the student should weigh out

By consulting the CRC Handbook of Chemistry and Physics, the student discovers that the density of acetone is 0.790 g.cm^-3.

  Summary of effectiveness of amazon it governance

Write a summary of the effectiveness of Amazon's IT governance and how it executes it's IT strategic vision as you understand it.

  What can you do if you need entries

What can you do if you need entries whose priority values are equal to be served on a first-come, first-served basis?

  Considering importance of data in organization

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database.

  Market structure-pricing power

What can be learned from the Epipen controversy on value pricing, market structure, pricing power?

  How much was the second payment

(a) How much was the second payment? (b) What is the equivalent uniform series (if she was going to pay the loan in 5 equal payments)?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd