SlideShare a Scribd company logo
1 of 2
Assignment
This is a short paper that requires you to study the provided
scenario, research its questions/problems, and provide analysis
and recommendations.
Scenario
Good morning. Your mission, should you choose to accept it, is
to analyze and recommend policies that mitigate two data-
breach attack vectors as discussed in this briefing, for a large
multi-national corporation (the Company).
Your cover is that you have just been hired as an Information
Security Engineer (ISE). The Company has suffered multiple
data breaches that have threatened trust in the Company. The
Company's reputation is at peril unless there is immediate
action to resolve these breaches.
This confidential data includes financial information and
personally identifiable information (PII) for corporations and
private citizens. CNBC reports that 15.4 million consumers
were victims of identity theft or fraud in 2018 at an economic
cost in excess of $16 billion dollars US.
Two attack profiles have been identified:
infiltration of the network through a vulnerable wireless
connection within the organization; and
an inside job where PII data was stolen as a result of weak
access controls.
Currently, the Company does not have policies that address
these two vulnerabilities. Your mission is to develop a risk-
management policy that addresses the two security breaches and
describes how to mitigate these risks. Good luck!
Requirements
This is an individual assignment, i.e. not a team or partner
assignment.
Use a three-paragraph format: an introduction/scenario recap,
analysis, and conclusion.
Provide an APA style reference page with at least two
references.
Double-spaced, font size 10 or 11.
500 word minimum, not including your name, title, or
references.

More Related Content

Similar to AssignmentThis is a short paper that requires you to study the p.docx

clearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureclearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochure
Lee Dalton
 
Information AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docxInformation AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docx
jaggernaoma
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
tidwellveronique
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
galagirishp
 

Similar to AssignmentThis is a short paper that requires you to study the p.docx (19)

INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
Information security for small business
Information security for small businessInformation security for small business
Information security for small business
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
clearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureclearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochure
 
Information AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docxInformation AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docx
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
 
July 2010 Cover Story
July 2010 Cover StoryJuly 2010 Cover Story
July 2010 Cover Story
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 

More from lascellesjaimie

BIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docx
BIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docxBIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docx
BIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docx
lascellesjaimie
 
Biology 110 Online Evolution labStudent Directions1.Go .docx
Biology 110 Online Evolution labStudent Directions1.Go .docxBiology 110 Online Evolution labStudent Directions1.Go .docx
Biology 110 Online Evolution labStudent Directions1.Go .docx
lascellesjaimie
 
Biodiversity hotspots are one conservation strategy used to direct f.docx
Biodiversity hotspots are one conservation strategy used to direct f.docxBiodiversity hotspots are one conservation strategy used to direct f.docx
Biodiversity hotspots are one conservation strategy used to direct f.docx
lascellesjaimie
 
BIO9 Human Biology Term ProjectGoals1. Being able to understand.docx
BIO9 Human Biology Term ProjectGoals1. Being able to understand.docxBIO9 Human Biology Term ProjectGoals1. Being able to understand.docx
BIO9 Human Biology Term ProjectGoals1. Being able to understand.docx
lascellesjaimie
 
Bill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docxBill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docx
lascellesjaimie
 
Biomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docx
Biomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docxBiomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docx
Biomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docx
lascellesjaimie
 
Biology 110 Online Evolution lab Student Directions 1.    Go to htt.docx
Biology 110 Online Evolution lab Student Directions 1.    Go to htt.docxBiology 110 Online Evolution lab Student Directions 1.    Go to htt.docx
Biology 110 Online Evolution lab Student Directions 1.    Go to htt.docx
lascellesjaimie
 
Biblical Worldview Essay InstructionsRationale for the Biblical .docx
Biblical Worldview Essay InstructionsRationale for the Biblical .docxBiblical Worldview Essay InstructionsRationale for the Biblical .docx
Biblical Worldview Essay InstructionsRationale for the Biblical .docx
lascellesjaimie
 
Benchmark - Evidence-Based Practice Project—Paper on Diabetes .docx
Benchmark - Evidence-Based Practice Project—Paper on Diabetes .docxBenchmark - Evidence-Based Practice Project—Paper on Diabetes .docx
Benchmark - Evidence-Based Practice Project—Paper on Diabetes .docx
lascellesjaimie
 
Below is 4 questions that I need answered. I usually just get other .docx
Below is 4 questions that I need answered. I usually just get other .docxBelow is 4 questions that I need answered. I usually just get other .docx
Below is 4 questions that I need answered. I usually just get other .docx
lascellesjaimie
 

More from lascellesjaimie (20)

Bluestone Company had three intangible assets at the end of 2014 (en.docx
Bluestone Company had three intangible assets at the end of 2014 (en.docxBluestone Company had three intangible assets at the end of 2014 (en.docx
Bluestone Company had three intangible assets at the end of 2014 (en.docx
 
BIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docx
BIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docxBIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docx
BIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docx
 
Bluestone Copany had three intangible assets at the end of the curre.docx
Bluestone Copany had three intangible assets at the end of the curre.docxBluestone Copany had three intangible assets at the end of the curre.docx
Bluestone Copany had three intangible assets at the end of the curre.docx
 
Biology 110 Online Evolution labStudent Directions1.Go .docx
Biology 110 Online Evolution labStudent Directions1.Go .docxBiology 110 Online Evolution labStudent Directions1.Go .docx
Biology 110 Online Evolution labStudent Directions1.Go .docx
 
Biological Psychology WorksheetAnswer the following questions wi.docx
Biological Psychology WorksheetAnswer the following questions wi.docxBiological Psychology WorksheetAnswer the following questions wi.docx
Biological Psychology WorksheetAnswer the following questions wi.docx
 
Biodiversity hotspots are one conservation strategy used to direct f.docx
Biodiversity hotspots are one conservation strategy used to direct f.docxBiodiversity hotspots are one conservation strategy used to direct f.docx
Biodiversity hotspots are one conservation strategy used to direct f.docx
 
BIO9 Human Biology Term ProjectGoals1. Being able to understand.docx
BIO9 Human Biology Term ProjectGoals1. Being able to understand.docxBIO9 Human Biology Term ProjectGoals1. Being able to understand.docx
BIO9 Human Biology Term ProjectGoals1. Being able to understand.docx
 
Bill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docxBill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docx
 
Biotechnology ApplicationsBiotechnology refers to the technical ap.docx
Biotechnology ApplicationsBiotechnology refers to the technical ap.docxBiotechnology ApplicationsBiotechnology refers to the technical ap.docx
Biotechnology ApplicationsBiotechnology refers to the technical ap.docx
 
Bios of 20 Important WomenStudents will be required to complete bi.docx
Bios of 20 Important WomenStudents will be required to complete bi.docxBios of 20 Important WomenStudents will be required to complete bi.docx
Bios of 20 Important WomenStudents will be required to complete bi.docx
 
Biomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docx
Biomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docxBiomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docx
Biomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docx
 
Biology 110 Online Evolution lab Student Directions 1.    Go to htt.docx
Biology 110 Online Evolution lab Student Directions 1.    Go to htt.docxBiology 110 Online Evolution lab Student Directions 1.    Go to htt.docx
Biology 110 Online Evolution lab Student Directions 1.    Go to htt.docx
 
Biblical Worldview Essay InstructionsRationale for the Biblical .docx
Biblical Worldview Essay InstructionsRationale for the Biblical .docxBiblical Worldview Essay InstructionsRationale for the Biblical .docx
Biblical Worldview Essay InstructionsRationale for the Biblical .docx
 
Biblical passaes 2 Samuel 13 1-22 looking for similarity between tw.docx
Biblical passaes 2 Samuel 13 1-22 looking for similarity between tw.docxBiblical passaes 2 Samuel 13 1-22 looking for similarity between tw.docx
Biblical passaes 2 Samuel 13 1-22 looking for similarity between tw.docx
 
Benefits of Nongoverning Volunteer Orientation and TrainingBoard G.docx
Benefits of Nongoverning Volunteer Orientation and TrainingBoard G.docxBenefits of Nongoverning Volunteer Orientation and TrainingBoard G.docx
Benefits of Nongoverning Volunteer Orientation and TrainingBoard G.docx
 
Bernard Madoff, a once highly regarded member of the Wall Street c.docx
Bernard Madoff, a once highly regarded member of the Wall Street c.docxBernard Madoff, a once highly regarded member of the Wall Street c.docx
Bernard Madoff, a once highly regarded member of the Wall Street c.docx
 
Benefits of a Diverse WorkforceCommunication is of utmost import.docx
Benefits of a Diverse WorkforceCommunication is of utmost import.docxBenefits of a Diverse WorkforceCommunication is of utmost import.docx
Benefits of a Diverse WorkforceCommunication is of utmost import.docx
 
Benchmark - Evidence-Based Practice Project—Paper on Diabetes .docx
Benchmark - Evidence-Based Practice Project—Paper on Diabetes .docxBenchmark - Evidence-Based Practice Project—Paper on Diabetes .docx
Benchmark - Evidence-Based Practice Project—Paper on Diabetes .docx
 
Below I attached the instructions and requirements for this paper..docx
Below I attached the instructions and requirements for this paper..docxBelow I attached the instructions and requirements for this paper..docx
Below I attached the instructions and requirements for this paper..docx
 
Below is 4 questions that I need answered. I usually just get other .docx
Below is 4 questions that I need answered. I usually just get other .docxBelow is 4 questions that I need answered. I usually just get other .docx
Below is 4 questions that I need answered. I usually just get other .docx
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 

AssignmentThis is a short paper that requires you to study the p.docx

  • 1. Assignment This is a short paper that requires you to study the provided scenario, research its questions/problems, and provide analysis and recommendations. Scenario Good morning. Your mission, should you choose to accept it, is to analyze and recommend policies that mitigate two data- breach attack vectors as discussed in this briefing, for a large multi-national corporation (the Company). Your cover is that you have just been hired as an Information Security Engineer (ISE). The Company has suffered multiple data breaches that have threatened trust in the Company. The Company's reputation is at peril unless there is immediate action to resolve these breaches. This confidential data includes financial information and personally identifiable information (PII) for corporations and private citizens. CNBC reports that 15.4 million consumers were victims of identity theft or fraud in 2018 at an economic cost in excess of $16 billion dollars US. Two attack profiles have been identified: infiltration of the network through a vulnerable wireless connection within the organization; and an inside job where PII data was stolen as a result of weak access controls.
  • 2. Currently, the Company does not have policies that address these two vulnerabilities. Your mission is to develop a risk- management policy that addresses the two security breaches and describes how to mitigate these risks. Good luck! Requirements This is an individual assignment, i.e. not a team or partner assignment. Use a three-paragraph format: an introduction/scenario recap, analysis, and conclusion. Provide an APA style reference page with at least two references. Double-spaced, font size 10 or 11. 500 word minimum, not including your name, title, or references.