SlideShare a Scribd company logo
1 of 1
Download to read offline
You have just been hired as an information security engineer for a large, multi-international
corporation. Unfortunately, your company has suffered multiple security breaches that have
threatened customers' trust in the fact that their confidential data and financial assets are private
and secured. Credit card information was compromised by an attack that infiltrated the network
through a vulnerable wireless connection within the organization. The other breach was an inside
job where personal data was stolen because of weak access control policies within the
organization that allowed an unauthorized individual access to valuable data. Your job is to
develop a risk management policy that addresses the two security breaches and how to mitigate
these risks.
Solution
Risk management is a structured approach to administering uncertainty and consist of actions
obtain to identify, assess, monitor, and reduce the impact of risks to your big business. Risks are
events, conditions or circumstances which lead to negative consequences for your business. A
good risk management plan with appropriate risk management strategies can minimize costly
and stressful problems, and may also decrease insurance claims and premiums. Efficient risk
management starts with the recognizing, by every person in the organization, that the effort is
main, and that everyone is supposed to uphold that effort. So far the organization has had its
security breached on a number of occasions. According to this trouble, the organization has
situated a high level of importance on physical and password security and anti-virus and anti-
spyware security. It has also make a decision to use 2 layers of firewalls to prevent hackers from
getting in. The organization will also use the IDSs and Virtual Private Networks. These steps
with the help of employees and staff should help prevent unauthorized intrusions from both
internal and external intruders that will take sensitive information from our clients. Management
has the ultimate responsibility to manage risks. Control includes making decisions considering
which risks are acceptable and how to address those that are not. Those decisions can be made
only with the participation of the entire workforce, since each of us understands the risks of his
or her own tasks improved than anyone else in the organization.

More Related Content

Similar to You have just been hired as an information security engineer for a l.pdf

Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015sarah kabirat
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfEnterprise Insider
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Accounting_Whitepapers
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...cyberprosocial
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
 
Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityEMC
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Accenture Technology
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...cyberprosocial
 
The Role of Incident Response in Cybersecurity: Protecting Your Organization
The Role of Incident Response in Cybersecurity: Protecting Your OrganizationThe Role of Incident Response in Cybersecurity: Protecting Your Organization
The Role of Incident Response in Cybersecurity: Protecting Your OrganizationLDMGlobal
 
Safeguarding Insurance Companies with Advanced Cybersecurity Solutions A Comp...
Safeguarding Insurance Companies with Advanced Cybersecurity Solutions A Comp...Safeguarding Insurance Companies with Advanced Cybersecurity Solutions A Comp...
Safeguarding Insurance Companies with Advanced Cybersecurity Solutions A Comp...AeoLogic Technologies
 
Navigating The Benefits of Firewall Managed Services.docx
Navigating The Benefits of Firewall Managed Services.docxNavigating The Benefits of Firewall Managed Services.docx
Navigating The Benefits of Firewall Managed Services.docxTheWalkerGroup1
 
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdfHow Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdfEnterprise Insider
 
Cyber Security Services for Business.pdf
Cyber Security Services for Business.pdfCyber Security Services for Business.pdf
Cyber Security Services for Business.pdfVograce
 
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsTo Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsElizabeth Dimit
 
Cyber Security Audit.pdf
Cyber Security Audit.pdfCyber Security Audit.pdf
Cyber Security Audit.pdfVograce
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...balejandre
 

Similar to You have just been hired as an information security engineer for a l.pdf (20)

Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven Security
 
MP_OneSheet_VulnThreat
MP_OneSheet_VulnThreatMP_OneSheet_VulnThreat
MP_OneSheet_VulnThreat
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
 
The Role of Incident Response in Cybersecurity: Protecting Your Organization
The Role of Incident Response in Cybersecurity: Protecting Your OrganizationThe Role of Incident Response in Cybersecurity: Protecting Your Organization
The Role of Incident Response in Cybersecurity: Protecting Your Organization
 
Safeguarding Insurance Companies with Advanced Cybersecurity Solutions A Comp...
Safeguarding Insurance Companies with Advanced Cybersecurity Solutions A Comp...Safeguarding Insurance Companies with Advanced Cybersecurity Solutions A Comp...
Safeguarding Insurance Companies with Advanced Cybersecurity Solutions A Comp...
 
Navigating The Benefits of Firewall Managed Services.docx
Navigating The Benefits of Firewall Managed Services.docxNavigating The Benefits of Firewall Managed Services.docx
Navigating The Benefits of Firewall Managed Services.docx
 
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdfHow Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
 
Cyber Security Services for Business.pdf
Cyber Security Services for Business.pdfCyber Security Services for Business.pdf
Cyber Security Services for Business.pdf
 
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsTo Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
 
Cyber Security Audit.pdf
Cyber Security Audit.pdfCyber Security Audit.pdf
Cyber Security Audit.pdf
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Grupo 4 - TEMA II.pptx
Grupo 4  - TEMA II.pptxGrupo 4  - TEMA II.pptx
Grupo 4 - TEMA II.pptx
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
 

More from feelingspaldi

Write an essay consists of 5 paragraphs (comparing between a city and.pdf
Write an essay consists of 5 paragraphs (comparing between a city and.pdfWrite an essay consists of 5 paragraphs (comparing between a city and.pdf
Write an essay consists of 5 paragraphs (comparing between a city and.pdffeelingspaldi
 
Why is Antitrust activity so harmful to consumers and the economy W.pdf
Why is Antitrust activity so harmful to consumers and the economy W.pdfWhy is Antitrust activity so harmful to consumers and the economy W.pdf
Why is Antitrust activity so harmful to consumers and the economy W.pdffeelingspaldi
 
Why should Emperor Conrad lead the crusades Use bible verse.Sol.pdf
Why should Emperor Conrad lead the crusades Use bible verse.Sol.pdfWhy should Emperor Conrad lead the crusades Use bible verse.Sol.pdf
Why should Emperor Conrad lead the crusades Use bible verse.Sol.pdffeelingspaldi
 
WHICH PERSON WOULD GENERLLY BE TREATED AS A MATERIAL PARTICIPANT IN .pdf
WHICH PERSON WOULD GENERLLY BE TREATED AS A MATERIAL PARTICIPANT IN .pdfWHICH PERSON WOULD GENERLLY BE TREATED AS A MATERIAL PARTICIPANT IN .pdf
WHICH PERSON WOULD GENERLLY BE TREATED AS A MATERIAL PARTICIPANT IN .pdffeelingspaldi
 
Which of the following are widely recognized disadvantages to the Eur.pdf
Which of the following are widely recognized disadvantages to the Eur.pdfWhich of the following are widely recognized disadvantages to the Eur.pdf
Which of the following are widely recognized disadvantages to the Eur.pdffeelingspaldi
 
What is the function of a rhizoid Describe asexual and sexual repro.pdf
What is the function of a rhizoid  Describe asexual and sexual repro.pdfWhat is the function of a rhizoid  Describe asexual and sexual repro.pdf
What is the function of a rhizoid Describe asexual and sexual repro.pdffeelingspaldi
 
We define a relation on set of Whole NumbersW={0,1,2,3…} As follow.pdf
We define a relation on set of Whole NumbersW={0,1,2,3…} As follow.pdfWe define a relation on set of Whole NumbersW={0,1,2,3…} As follow.pdf
We define a relation on set of Whole NumbersW={0,1,2,3…} As follow.pdffeelingspaldi
 
What does the cutting-plane line represent List and explain seven d.pdf
What does the cutting-plane line represent  List and explain seven d.pdfWhat does the cutting-plane line represent  List and explain seven d.pdf
What does the cutting-plane line represent List and explain seven d.pdffeelingspaldi
 
True or False The employment relationship that is typical of modern.pdf
True or False The employment relationship that is typical of modern.pdfTrue or False The employment relationship that is typical of modern.pdf
True or False The employment relationship that is typical of modern.pdffeelingspaldi
 
The following monthly data are taken from Ramirez Company at July 31.pdf
The following monthly data are taken from Ramirez Company at July 31.pdfThe following monthly data are taken from Ramirez Company at July 31.pdf
The following monthly data are taken from Ramirez Company at July 31.pdffeelingspaldi
 
State the reasons for the current drought in South Africa. Describe .pdf
State the reasons for the current drought in South Africa. Describe .pdfState the reasons for the current drought in South Africa. Describe .pdf
State the reasons for the current drought in South Africa. Describe .pdffeelingspaldi
 
Select the true statements concerning seeds.A Seeds allow for dor.pdf
Select the true statements concerning seeds.A Seeds allow for dor.pdfSelect the true statements concerning seeds.A Seeds allow for dor.pdf
Select the true statements concerning seeds.A Seeds allow for dor.pdffeelingspaldi
 
Russian dude. Formulated the ____ hypothesis regarding prebioisSo.pdf
Russian dude. Formulated the ____ hypothesis regarding prebioisSo.pdfRussian dude. Formulated the ____ hypothesis regarding prebioisSo.pdf
Russian dude. Formulated the ____ hypothesis regarding prebioisSo.pdffeelingspaldi
 
Robin Hartshorne• a biography of the mathematician• a descriptio.pdf
Robin Hartshorne• a biography of the mathematician• a descriptio.pdfRobin Hartshorne• a biography of the mathematician• a descriptio.pdf
Robin Hartshorne• a biography of the mathematician• a descriptio.pdffeelingspaldi
 
Question 7 Write the expression in expanded form. 81n x + In y O4 Inx.pdf
Question 7 Write the expression in expanded form. 81n x + In y O4 Inx.pdfQuestion 7 Write the expression in expanded form. 81n x + In y O4 Inx.pdf
Question 7 Write the expression in expanded form. 81n x + In y O4 Inx.pdffeelingspaldi
 
Position of birds eating sunflower seed is the niche dimension we.pdf
Position of birds eating sunflower seed is the niche dimension we.pdfPosition of birds eating sunflower seed is the niche dimension we.pdf
Position of birds eating sunflower seed is the niche dimension we.pdffeelingspaldi
 
Physical Security Plan1.Identify the role of environmental control.pdf
Physical Security Plan1.Identify the role of environmental control.pdfPhysical Security Plan1.Identify the role of environmental control.pdf
Physical Security Plan1.Identify the role of environmental control.pdffeelingspaldi
 
Part I. True or False Place a T or an F, whichever you consider cor.pdf
Part I. True or False Place a T or an F, whichever you consider cor.pdfPart I. True or False Place a T or an F, whichever you consider cor.pdf
Part I. True or False Place a T or an F, whichever you consider cor.pdffeelingspaldi
 
Module 03 Discussion - Musics Impact on Baby Boomers.pdf
Module 03 Discussion - Musics Impact on Baby Boomers.pdfModule 03 Discussion - Musics Impact on Baby Boomers.pdf
Module 03 Discussion - Musics Impact on Baby Boomers.pdffeelingspaldi
 
Lynn files a suit against Karl. Karl denies Lynns charges and sets.pdf
Lynn files a suit against Karl. Karl denies Lynns charges and sets.pdfLynn files a suit against Karl. Karl denies Lynns charges and sets.pdf
Lynn files a suit against Karl. Karl denies Lynns charges and sets.pdffeelingspaldi
 

More from feelingspaldi (20)

Write an essay consists of 5 paragraphs (comparing between a city and.pdf
Write an essay consists of 5 paragraphs (comparing between a city and.pdfWrite an essay consists of 5 paragraphs (comparing between a city and.pdf
Write an essay consists of 5 paragraphs (comparing between a city and.pdf
 
Why is Antitrust activity so harmful to consumers and the economy W.pdf
Why is Antitrust activity so harmful to consumers and the economy W.pdfWhy is Antitrust activity so harmful to consumers and the economy W.pdf
Why is Antitrust activity so harmful to consumers and the economy W.pdf
 
Why should Emperor Conrad lead the crusades Use bible verse.Sol.pdf
Why should Emperor Conrad lead the crusades Use bible verse.Sol.pdfWhy should Emperor Conrad lead the crusades Use bible verse.Sol.pdf
Why should Emperor Conrad lead the crusades Use bible verse.Sol.pdf
 
WHICH PERSON WOULD GENERLLY BE TREATED AS A MATERIAL PARTICIPANT IN .pdf
WHICH PERSON WOULD GENERLLY BE TREATED AS A MATERIAL PARTICIPANT IN .pdfWHICH PERSON WOULD GENERLLY BE TREATED AS A MATERIAL PARTICIPANT IN .pdf
WHICH PERSON WOULD GENERLLY BE TREATED AS A MATERIAL PARTICIPANT IN .pdf
 
Which of the following are widely recognized disadvantages to the Eur.pdf
Which of the following are widely recognized disadvantages to the Eur.pdfWhich of the following are widely recognized disadvantages to the Eur.pdf
Which of the following are widely recognized disadvantages to the Eur.pdf
 
What is the function of a rhizoid Describe asexual and sexual repro.pdf
What is the function of a rhizoid  Describe asexual and sexual repro.pdfWhat is the function of a rhizoid  Describe asexual and sexual repro.pdf
What is the function of a rhizoid Describe asexual and sexual repro.pdf
 
We define a relation on set of Whole NumbersW={0,1,2,3…} As follow.pdf
We define a relation on set of Whole NumbersW={0,1,2,3…} As follow.pdfWe define a relation on set of Whole NumbersW={0,1,2,3…} As follow.pdf
We define a relation on set of Whole NumbersW={0,1,2,3…} As follow.pdf
 
What does the cutting-plane line represent List and explain seven d.pdf
What does the cutting-plane line represent  List and explain seven d.pdfWhat does the cutting-plane line represent  List and explain seven d.pdf
What does the cutting-plane line represent List and explain seven d.pdf
 
True or False The employment relationship that is typical of modern.pdf
True or False The employment relationship that is typical of modern.pdfTrue or False The employment relationship that is typical of modern.pdf
True or False The employment relationship that is typical of modern.pdf
 
The following monthly data are taken from Ramirez Company at July 31.pdf
The following monthly data are taken from Ramirez Company at July 31.pdfThe following monthly data are taken from Ramirez Company at July 31.pdf
The following monthly data are taken from Ramirez Company at July 31.pdf
 
State the reasons for the current drought in South Africa. Describe .pdf
State the reasons for the current drought in South Africa. Describe .pdfState the reasons for the current drought in South Africa. Describe .pdf
State the reasons for the current drought in South Africa. Describe .pdf
 
Select the true statements concerning seeds.A Seeds allow for dor.pdf
Select the true statements concerning seeds.A Seeds allow for dor.pdfSelect the true statements concerning seeds.A Seeds allow for dor.pdf
Select the true statements concerning seeds.A Seeds allow for dor.pdf
 
Russian dude. Formulated the ____ hypothesis regarding prebioisSo.pdf
Russian dude. Formulated the ____ hypothesis regarding prebioisSo.pdfRussian dude. Formulated the ____ hypothesis regarding prebioisSo.pdf
Russian dude. Formulated the ____ hypothesis regarding prebioisSo.pdf
 
Robin Hartshorne• a biography of the mathematician• a descriptio.pdf
Robin Hartshorne• a biography of the mathematician• a descriptio.pdfRobin Hartshorne• a biography of the mathematician• a descriptio.pdf
Robin Hartshorne• a biography of the mathematician• a descriptio.pdf
 
Question 7 Write the expression in expanded form. 81n x + In y O4 Inx.pdf
Question 7 Write the expression in expanded form. 81n x + In y O4 Inx.pdfQuestion 7 Write the expression in expanded form. 81n x + In y O4 Inx.pdf
Question 7 Write the expression in expanded form. 81n x + In y O4 Inx.pdf
 
Position of birds eating sunflower seed is the niche dimension we.pdf
Position of birds eating sunflower seed is the niche dimension we.pdfPosition of birds eating sunflower seed is the niche dimension we.pdf
Position of birds eating sunflower seed is the niche dimension we.pdf
 
Physical Security Plan1.Identify the role of environmental control.pdf
Physical Security Plan1.Identify the role of environmental control.pdfPhysical Security Plan1.Identify the role of environmental control.pdf
Physical Security Plan1.Identify the role of environmental control.pdf
 
Part I. True or False Place a T or an F, whichever you consider cor.pdf
Part I. True or False Place a T or an F, whichever you consider cor.pdfPart I. True or False Place a T or an F, whichever you consider cor.pdf
Part I. True or False Place a T or an F, whichever you consider cor.pdf
 
Module 03 Discussion - Musics Impact on Baby Boomers.pdf
Module 03 Discussion - Musics Impact on Baby Boomers.pdfModule 03 Discussion - Musics Impact on Baby Boomers.pdf
Module 03 Discussion - Musics Impact on Baby Boomers.pdf
 
Lynn files a suit against Karl. Karl denies Lynns charges and sets.pdf
Lynn files a suit against Karl. Karl denies Lynns charges and sets.pdfLynn files a suit against Karl. Karl denies Lynns charges and sets.pdf
Lynn files a suit against Karl. Karl denies Lynns charges and sets.pdf
 

Recently uploaded

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfstareducators107
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfNirmal Dwivedi
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxCeline George
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 

Recently uploaded (20)

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 

You have just been hired as an information security engineer for a l.pdf

  • 1. You have just been hired as an information security engineer for a large, multi-international corporation. Unfortunately, your company has suffered multiple security breaches that have threatened customers' trust in the fact that their confidential data and financial assets are private and secured. Credit card information was compromised by an attack that infiltrated the network through a vulnerable wireless connection within the organization. The other breach was an inside job where personal data was stolen because of weak access control policies within the organization that allowed an unauthorized individual access to valuable data. Your job is to develop a risk management policy that addresses the two security breaches and how to mitigate these risks. Solution Risk management is a structured approach to administering uncertainty and consist of actions obtain to identify, assess, monitor, and reduce the impact of risks to your big business. Risks are events, conditions or circumstances which lead to negative consequences for your business. A good risk management plan with appropriate risk management strategies can minimize costly and stressful problems, and may also decrease insurance claims and premiums. Efficient risk management starts with the recognizing, by every person in the organization, that the effort is main, and that everyone is supposed to uphold that effort. So far the organization has had its security breached on a number of occasions. According to this trouble, the organization has situated a high level of importance on physical and password security and anti-virus and anti- spyware security. It has also make a decision to use 2 layers of firewalls to prevent hackers from getting in. The organization will also use the IDSs and Virtual Private Networks. These steps with the help of employees and staff should help prevent unauthorized intrusions from both internal and external intruders that will take sensitive information from our clients. Management has the ultimate responsibility to manage risks. Control includes making decisions considering which risks are acceptable and how to address those that are not. Those decisions can be made only with the participation of the entire workforce, since each of us understands the risks of his or her own tasks improved than anyone else in the organization.