SlideShare a Scribd company logo
1 of 8
WELCOME Chapter 11 Group: Anju, Ashok, Justin, Joe and Christina
[object Object]
Identify positive and negative risks and strategies for addressing each risk. Exercise #1
[object Object],Environmental threats such as a bursting pipe can quickly flood a computer room and cause damage to an organization’s IT assets and resources.  ,[object Object],Protect IT assets from fire damage (e.g., requirements and procedures for the use of fire extinguishers, tarpaulins, dry sprinkler systems, halon fire suppression system) Provide emergency power source (e.g., requirements for uninterruptible power supplies, on-site power generators) ,[object Object],Any sort of information is easily available on a single click via the various forms and built in software applications. Christina
[object Object],Not all stakeholders might be interested in managing their information. So, the new system might loose some potential data. ,[object Object],Users will feel more secure because they themselves can update their private information. Ashok
[object Object],When a person is allowed to provide their information, it is not necessary they will provide there real information. ,[object Object],Some sort of  authentication procedure should be implemented. ,[object Object],Most of the information are always updated. Anju
[object Object],One negative risk would be in people posing as others in order to obtain or alter their information, either in specific cases or on a much wider scale.   ,[object Object],One method of tackling such a risk would be in establishing a method of authentication that can ensure people are who they say they are. ,[object Object],One positive risk would be that information would be the most accurate and up to date with people having control over it, yet this can be a problem if many individuals either choose or forget to maintain this information. ,[object Object],As a solution, the company can notify people in a rigorous effort to keep their information current and up to date along with why it is important to do so. Justin
[object Object],All data for each individual in the organization would be kept in one central location and, if maliciously accessed, could destroy internal processes and hinder work flow. ,[object Object],Create several security barriers and properly encrypt data. Create secure platform for users to access and add data. ,[object Object],All data would be kept in one location and easily accessible by the HR staff. Data would also be more updated and allow HR staff to concentrate on other areas of operation. Joe

More Related Content

What's hot

Office365 training - for the Beginner
Office365 training - for the BeginnerOffice365 training - for the Beginner
Office365 training - for the BeginnerLynn Dye
 
Project Scoping PowerPoint Presentation Slides
Project Scoping PowerPoint Presentation SlidesProject Scoping PowerPoint Presentation Slides
Project Scoping PowerPoint Presentation SlidesSlideTeam
 
Project Status Report Timeline Of Product Status
Project Status Report Timeline Of Product StatusProject Status Report Timeline Of Product Status
Project Status Report Timeline Of Product StatusSlideTeam
 
Business Plan for Branding PowerPoint Presentation Slides
Business Plan for Branding PowerPoint Presentation Slides Business Plan for Branding PowerPoint Presentation Slides
Business Plan for Branding PowerPoint Presentation Slides SlideTeam
 
The how and why of patch management by N-able
The how and why of patch management by N-able The how and why of patch management by N-able
The how and why of patch management by N-able Solarwinds N-able
 
Proposal Writing
Proposal WritingProposal Writing
Proposal WritingHuiying Ke
 
The proven pitch deck template
The proven pitch deck templateThe proven pitch deck template
The proven pitch deck templateBundl
 
Process Scope Powerpoint Template
Process Scope Powerpoint TemplateProcess Scope Powerpoint Template
Process Scope Powerpoint TemplateSlideTeam
 
Project Proposal Hints
Project  Proposal  HintsProject  Proposal  Hints
Project Proposal Hintsguest6b1035
 
Android task manager project presentation
Android task manager project presentationAndroid task manager project presentation
Android task manager project presentationAkhilesh Jaiswal
 
Project management@ ppt doms
Project management@ ppt doms Project management@ ppt doms
Project management@ ppt doms Babasab Patil
 
Project Status Summary One Pager Report Presentation Report Infographic Ppt P...
Project Status Summary One Pager Report Presentation Report Infographic Ppt P...Project Status Summary One Pager Report Presentation Report Infographic Ppt P...
Project Status Summary One Pager Report Presentation Report Infographic Ppt P...SlideTeam
 
Cloud platform technical sales presentation
Cloud platform technical sales presentationCloud platform technical sales presentation
Cloud platform technical sales presentationNuno Alves
 
Office 365 introduction and technical overview
Office 365 introduction and technical overviewOffice 365 introduction and technical overview
Office 365 introduction and technical overviewMotty Ben Atia
 
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Timothy McAliley
 

What's hot (20)

Office365 training - for the Beginner
Office365 training - for the BeginnerOffice365 training - for the Beginner
Office365 training - for the Beginner
 
Project Scoping PowerPoint Presentation Slides
Project Scoping PowerPoint Presentation SlidesProject Scoping PowerPoint Presentation Slides
Project Scoping PowerPoint Presentation Slides
 
Presentation On Slack
Presentation On SlackPresentation On Slack
Presentation On Slack
 
Project Status Report Timeline Of Product Status
Project Status Report Timeline Of Product StatusProject Status Report Timeline Of Product Status
Project Status Report Timeline Of Product Status
 
Business Plan for Branding PowerPoint Presentation Slides
Business Plan for Branding PowerPoint Presentation Slides Business Plan for Branding PowerPoint Presentation Slides
Business Plan for Branding PowerPoint Presentation Slides
 
The how and why of patch management by N-able
The how and why of patch management by N-able The how and why of patch management by N-able
The how and why of patch management by N-able
 
Proposal Writing
Proposal WritingProposal Writing
Proposal Writing
 
Product Roadmap - May 2018
Product Roadmap - May 2018Product Roadmap - May 2018
Product Roadmap - May 2018
 
The proven pitch deck template
The proven pitch deck templateThe proven pitch deck template
The proven pitch deck template
 
Process Scope Powerpoint Template
Process Scope Powerpoint TemplateProcess Scope Powerpoint Template
Process Scope Powerpoint Template
 
Project Proposal Hints
Project  Proposal  HintsProject  Proposal  Hints
Project Proposal Hints
 
Android task manager project presentation
Android task manager project presentationAndroid task manager project presentation
Android task manager project presentation
 
Project management@ ppt doms
Project management@ ppt doms Project management@ ppt doms
Project management@ ppt doms
 
Microsoft Teams
Microsoft TeamsMicrosoft Teams
Microsoft Teams
 
Project Status Summary One Pager Report Presentation Report Infographic Ppt P...
Project Status Summary One Pager Report Presentation Report Infographic Ppt P...Project Status Summary One Pager Report Presentation Report Infographic Ppt P...
Project Status Summary One Pager Report Presentation Report Infographic Ppt P...
 
MULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTUREMULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTURE
 
Cloud platform technical sales presentation
Cloud platform technical sales presentationCloud platform technical sales presentation
Cloud platform technical sales presentation
 
How 2 slack
How 2 slackHow 2 slack
How 2 slack
 
Office 365 introduction and technical overview
Office 365 introduction and technical overviewOffice 365 introduction and technical overview
Office 365 introduction and technical overview
 
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
 

Similar to Chapter 11 group assignment

Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docxsodhi3
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!Caroline Johnson
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Monica Rivera
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityDavid X Martin
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docxharrisonhoward80223
 
Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)
Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)
Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)UN Global Pulse
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishRSIS International
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020Jessica Graf
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEOMicheal Axelsen
 
Experion Data Breach Response Excerpts
Experion Data Breach Response ExcerptsExperion Data Breach Response Excerpts
Experion Data Breach Response ExcerptsPeter Henley
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docxaryan532920
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfTheWalkerGroup1
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationIJERA Editor
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationApril Dillard
 

Similar to Chapter 11 group assignment (20)

Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!
 
Ijnsa050201
Ijnsa050201Ijnsa050201
Ijnsa050201
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
 
PACE-IT, Security+ 2.5: Incident Response Concepts
PACE-IT, Security+ 2.5: Incident Response ConceptsPACE-IT, Security+ 2.5: Incident Response Concepts
PACE-IT, Security+ 2.5: Incident Response Concepts
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docx
 
Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)
Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)
Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEO
 
Experion Data Breach Response Excerpts
Experion Data Breach Response ExcerptsExperion Data Breach Response Excerpts
Experion Data Breach Response Excerpts
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an Organization
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
Data Security
Data SecurityData Security
Data Security
 

More from jandrewsxu

Chapter #11 lab
Chapter #11 labChapter #11 lab
Chapter #11 labjandrewsxu
 
Chapter #8 lab
Chapter #8 labChapter #8 lab
Chapter #8 labjandrewsxu
 
Chapter #4 lab
Chapter #4 labChapter #4 lab
Chapter #4 labjandrewsxu
 
Modulation schemes 8
Modulation schemes 8Modulation schemes 8
Modulation schemes 8jandrewsxu
 
Modulation techniques 7
Modulation techniques 7Modulation techniques 7
Modulation techniques 7jandrewsxu
 
Bluetooth wi fi wi max 2, 3
Bluetooth wi fi wi max 2, 3Bluetooth wi fi wi max 2, 3
Bluetooth wi fi wi max 2, 3jandrewsxu
 
Acsg 520 assignment #6 ---
Acsg 520   assignment #6 ---Acsg 520   assignment #6 ---
Acsg 520 assignment #6 ---jandrewsxu
 
Acsg 520 assignment #4 --
Acsg 520 assignment #4  --Acsg 520 assignment #4  --
Acsg 520 assignment #4 --jandrewsxu
 
First hw assignment #1 --
First hw assignment #1  --First hw assignment #1  --
First hw assignment #1 --jandrewsxu
 
Assumptions, applicable measures, er diagram
Assumptions, applicable measures, er diagramAssumptions, applicable measures, er diagram
Assumptions, applicable measures, er diagramjandrewsxu
 
Data dictionary
Data dictionaryData dictionary
Data dictionaryjandrewsxu
 
Assumptions, and applicable measures
Assumptions, and applicable measuresAssumptions, and applicable measures
Assumptions, and applicable measuresjandrewsxu
 
Final presentation(v5)
Final presentation(v5)Final presentation(v5)
Final presentation(v5)jandrewsxu
 
Database chapter 11 homework
Database chapter 11 homeworkDatabase chapter 11 homework
Database chapter 11 homeworkjandrewsxu
 
Database chapter 10 questions
Database chapter 10 questionsDatabase chapter 10 questions
Database chapter 10 questionsjandrewsxu
 
Essay #2 ethical considerations
Essay #2   ethical considerationsEssay #2   ethical considerations
Essay #2 ethical considerationsjandrewsxu
 
Midterm paper medical records
Midterm paper   medical recordsMidterm paper   medical records
Midterm paper medical recordsjandrewsxu
 

More from jandrewsxu (20)

Resume
ResumeResume
Resume
 
Resume
ResumeResume
Resume
 
Chapter #11 lab
Chapter #11 labChapter #11 lab
Chapter #11 lab
 
Chapter #8 lab
Chapter #8 labChapter #8 lab
Chapter #8 lab
 
Chapter #4 lab
Chapter #4 labChapter #4 lab
Chapter #4 lab
 
Modulation schemes 8
Modulation schemes 8Modulation schemes 8
Modulation schemes 8
 
Modulation techniques 7
Modulation techniques 7Modulation techniques 7
Modulation techniques 7
 
Bluetooth wi fi wi max 2, 3
Bluetooth wi fi wi max 2, 3Bluetooth wi fi wi max 2, 3
Bluetooth wi fi wi max 2, 3
 
Acsg 520 assignment #6 ---
Acsg 520   assignment #6 ---Acsg 520   assignment #6 ---
Acsg 520 assignment #6 ---
 
Acsg 520 assignment #4 --
Acsg 520 assignment #4  --Acsg 520 assignment #4  --
Acsg 520 assignment #4 --
 
First hw assignment #1 --
First hw assignment #1  --First hw assignment #1  --
First hw assignment #1 --
 
Journal
JournalJournal
Journal
 
Assumptions, applicable measures, er diagram
Assumptions, applicable measures, er diagramAssumptions, applicable measures, er diagram
Assumptions, applicable measures, er diagram
 
Data dictionary
Data dictionaryData dictionary
Data dictionary
 
Assumptions, and applicable measures
Assumptions, and applicable measuresAssumptions, and applicable measures
Assumptions, and applicable measures
 
Final presentation(v5)
Final presentation(v5)Final presentation(v5)
Final presentation(v5)
 
Database chapter 11 homework
Database chapter 11 homeworkDatabase chapter 11 homework
Database chapter 11 homework
 
Database chapter 10 questions
Database chapter 10 questionsDatabase chapter 10 questions
Database chapter 10 questions
 
Essay #2 ethical considerations
Essay #2   ethical considerationsEssay #2   ethical considerations
Essay #2 ethical considerations
 
Midterm paper medical records
Midterm paper   medical recordsMidterm paper   medical records
Midterm paper medical records
 

Chapter 11 group assignment