SlideShare a Scribd company logo
Chapter 11 – Network Security
The president of NDAS has just read a newspaper article explaining that the top security threats
to companies aren’t always from hackers trying to break in through the corporate firewall. In
many cases, companies are more concerned about things such as internal employees and social
engineering. After reading this article, he rushed down to Les Coone’s office to understand
what
could happen to NDAS. Les has turned to you to prepare an analysis of NDAS security.
While Les was in your office you mention that a security issue you recently learned about needs
to be addressed. Five employees in the Accounts Payable office were recently given two weeks
notice of their impending layoff due to the outsourcing of some of the Accounts Payable
functions
to another company. As you understand it, those five employees aren’t happy with being
released.
Exercises
1. Prepare a report outlining the major security threats faced by NDAS. Be sure to identify those
that you think are major threats and those that are minor threats.
2. Prepare a partial risk assessment for NDAS that includes their major assets, threats, and
controls. You will need to make some reasonable assumptions.
3. Develop a set of security controls, for use in the NDAS main office and for its Web site,
designed to control risks due to disruption, destruction, and disaster and unauthorized access.
4. Think about the accounts payable employees that are being laid off. What should be done to
ensure that they don’t do anything (such as steal customer data files, etc) before they leave
the
company. With their access to so much accounting data and other network access, list some of
the main concerns that you may have. In addition, what will you suggest to mitigate these risks?
Solution
1) The major security threats faced by NDAS are :
The minor threats may be exposing the information regarding transactions, customer information
and inventory. Mostly thee internal threats are minor.
2) The partial risk assessment for NDAS includes the following steps:
Consider the dispersed nature of NDAS operations i.e the NDAS offices spread across 16 cities
in the country, so focus on all of it. Firstly focus on the major threats that are caused.
3) The set of security protocols to control risks due to disruption, destruction and disaster are as
follows:
The set of protocols for unauthorised access are:
The staff should respond immediately to identify the intruder and to take appropriate action to
control threat.
4)

More Related Content

Similar to Chapter 11 Network Security The president of NDAS has just read a new.docx

Five Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementFive Mistakes of Vulnerability Management
Five Mistakes of Vulnerability Management
Anton Chuvakin
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
Tiffany Graham
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
CMR WORLD TECH
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
inside-BigData.com
 
Course Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information SystemCourse Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information System
Theodore Le
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
CBIZ, Inc.
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
Bala Guntipalli ♦ MBA
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
National Retail Federation
 
a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2
Mike Revell
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Accellis Technology Group
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
jjvdneut
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
jjvdneut
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
SOCVault
 
case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)
ishan parikh production
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
Mekhi Da ‘Quay Daniels
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
RedhuntLabs2
 
CISO-Fundamentals
CISO-FundamentalsCISO-Fundamentals
Anticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistAnticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach Checklist
Morrison & Foerster
 
You are the information technology senior analyst at your Private Eq.docx
You are the information technology senior analyst at your Private Eq.docxYou are the information technology senior analyst at your Private Eq.docx
You are the information technology senior analyst at your Private Eq.docx
jacvzpline
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic Security
Chad Korosec
 

Similar to Chapter 11 Network Security The president of NDAS has just read a new.docx (20)

Five Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementFive Mistakes of Vulnerability Management
Five Mistakes of Vulnerability Management
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
Course Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information SystemCourse Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information System
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
 
case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
CISO-Fundamentals
CISO-FundamentalsCISO-Fundamentals
CISO-Fundamentals
 
Anticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistAnticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach Checklist
 
You are the information technology senior analyst at your Private Eq.docx
You are the information technology senior analyst at your Private Eq.docxYou are the information technology senior analyst at your Private Eq.docx
You are the information technology senior analyst at your Private Eq.docx
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic Security
 

More from tienlivick

The long-term liability section of Twin Digital Corporation's balance.docx
The long-term liability section of Twin Digital Corporation's balance.docxThe long-term liability section of Twin Digital Corporation's balance.docx
The long-term liability section of Twin Digital Corporation's balance.docx
tienlivick
 
The length of time- in minutes- for an airplane to obtain clearance fo.docx
The length of time- in minutes- for an airplane to obtain clearance fo.docxThe length of time- in minutes- for an airplane to obtain clearance fo.docx
The length of time- in minutes- for an airplane to obtain clearance fo.docx
tienlivick
 
The Kansas Early Learning Standards for Social and Emotional Developme.docx
The Kansas Early Learning Standards for Social and Emotional Developme.docxThe Kansas Early Learning Standards for Social and Emotional Developme.docx
The Kansas Early Learning Standards for Social and Emotional Developme.docx
tienlivick
 
The Italian economy can be characterized by the following information-.docx
The Italian economy can be characterized by the following information-.docxThe Italian economy can be characterized by the following information-.docx
The Italian economy can be characterized by the following information-.docx
tienlivick
 
The individual that reports to the respective discipline manager- and.docx
The individual that reports to the respective discipline manager- and.docxThe individual that reports to the respective discipline manager- and.docx
The individual that reports to the respective discipline manager- and.docx
tienlivick
 
The Implementation The unique requirement for the SpecializedList is t.docx
The Implementation The unique requirement for the SpecializedList is t.docxThe Implementation The unique requirement for the SpecializedList is t.docx
The Implementation The unique requirement for the SpecializedList is t.docx
tienlivick
 
The imount liay ned to put aiay loday a f (Riound 13 en nemest cent).docx
The imount liay ned to put aiay loday a f (Riound 13 en nemest cent).docxThe imount liay ned to put aiay loday a f (Riound 13 en nemest cent).docx
The imount liay ned to put aiay loday a f (Riound 13 en nemest cent).docx
tienlivick
 
The hepcidin hormone acts as a negative regulator of iron absorption-.docx
The hepcidin hormone acts as a negative regulator of iron absorption-.docxThe hepcidin hormone acts as a negative regulator of iron absorption-.docx
The hepcidin hormone acts as a negative regulator of iron absorption-.docx
tienlivick
 
The Hardy-Weinberg principleapplies to which populations- Populations.docx
The Hardy-Weinberg principleapplies to which populations- Populations.docxThe Hardy-Weinberg principleapplies to which populations- Populations.docx
The Hardy-Weinberg principleapplies to which populations- Populations.docx
tienlivick
 
The Giant Kelp forests of the US Pacific coast have really cold water-.docx
The Giant Kelp forests of the US Pacific coast have really cold water-.docxThe Giant Kelp forests of the US Pacific coast have really cold water-.docx
The Giant Kelp forests of the US Pacific coast have really cold water-.docx
tienlivick
 
The function T(n) satisfies T(n)-2T(3n)+O(n2)- Which of the following.docx
The function T(n) satisfies T(n)-2T(3n)+O(n2)- Which of the following.docxThe function T(n) satisfies T(n)-2T(3n)+O(n2)- Which of the following.docx
The function T(n) satisfies T(n)-2T(3n)+O(n2)- Which of the following.docx
tienlivick
 
The following table summarizes the ages of a sample of 57 adults that.docx
The following table summarizes the ages of a sample of 57 adults that.docxThe following table summarizes the ages of a sample of 57 adults that.docx
The following table summarizes the ages of a sample of 57 adults that.docx
tienlivick
 
The following table presents output per hour in the country of Mistani.docx
The following table presents output per hour in the country of Mistani.docxThe following table presents output per hour in the country of Mistani.docx
The following table presents output per hour in the country of Mistani.docx
tienlivick
 
The following selected transactions occurred during 2024 and 2025 for.docx
The following selected transactions occurred during 2024 and 2025 for.docxThe following selected transactions occurred during 2024 and 2025 for.docx
The following selected transactions occurred during 2024 and 2025 for.docx
tienlivick
 
The following refer to the following data set- What is the mean (x) of.docx
The following refer to the following data set- What is the mean (x) of.docxThe following refer to the following data set- What is the mean (x) of.docx
The following refer to the following data set- What is the mean (x) of.docx
tienlivick
 
The following questions are based on the case study- The Human Right t.docx
The following questions are based on the case study- The Human Right t.docxThe following questions are based on the case study- The Human Right t.docx
The following questions are based on the case study- The Human Right t.docx
tienlivick
 
The following items are taken from the financial statements of Pharoah.docx
The following items are taken from the financial statements of Pharoah.docxThe following items are taken from the financial statements of Pharoah.docx
The following items are taken from the financial statements of Pharoah.docx
tienlivick
 
The following financial assets appeared in a recent balance sheet of A.docx
The following financial assets appeared in a recent balance sheet of A.docxThe following financial assets appeared in a recent balance sheet of A.docx
The following financial assets appeared in a recent balance sheet of A.docx
tienlivick
 
The following graph shows an aggregate demand (AD) curve and a short-r.docx
The following graph shows an aggregate demand (AD) curve and a short-r.docxThe following graph shows an aggregate demand (AD) curve and a short-r.docx
The following graph shows an aggregate demand (AD) curve and a short-r.docx
tienlivick
 
The first production department of Stone Incorporated reports the foll.docx
The first production department of Stone Incorporated reports the foll.docxThe first production department of Stone Incorporated reports the foll.docx
The first production department of Stone Incorporated reports the foll.docx
tienlivick
 

More from tienlivick (20)

The long-term liability section of Twin Digital Corporation's balance.docx
The long-term liability section of Twin Digital Corporation's balance.docxThe long-term liability section of Twin Digital Corporation's balance.docx
The long-term liability section of Twin Digital Corporation's balance.docx
 
The length of time- in minutes- for an airplane to obtain clearance fo.docx
The length of time- in minutes- for an airplane to obtain clearance fo.docxThe length of time- in minutes- for an airplane to obtain clearance fo.docx
The length of time- in minutes- for an airplane to obtain clearance fo.docx
 
The Kansas Early Learning Standards for Social and Emotional Developme.docx
The Kansas Early Learning Standards for Social and Emotional Developme.docxThe Kansas Early Learning Standards for Social and Emotional Developme.docx
The Kansas Early Learning Standards for Social and Emotional Developme.docx
 
The Italian economy can be characterized by the following information-.docx
The Italian economy can be characterized by the following information-.docxThe Italian economy can be characterized by the following information-.docx
The Italian economy can be characterized by the following information-.docx
 
The individual that reports to the respective discipline manager- and.docx
The individual that reports to the respective discipline manager- and.docxThe individual that reports to the respective discipline manager- and.docx
The individual that reports to the respective discipline manager- and.docx
 
The Implementation The unique requirement for the SpecializedList is t.docx
The Implementation The unique requirement for the SpecializedList is t.docxThe Implementation The unique requirement for the SpecializedList is t.docx
The Implementation The unique requirement for the SpecializedList is t.docx
 
The imount liay ned to put aiay loday a f (Riound 13 en nemest cent).docx
The imount liay ned to put aiay loday a f (Riound 13 en nemest cent).docxThe imount liay ned to put aiay loday a f (Riound 13 en nemest cent).docx
The imount liay ned to put aiay loday a f (Riound 13 en nemest cent).docx
 
The hepcidin hormone acts as a negative regulator of iron absorption-.docx
The hepcidin hormone acts as a negative regulator of iron absorption-.docxThe hepcidin hormone acts as a negative regulator of iron absorption-.docx
The hepcidin hormone acts as a negative regulator of iron absorption-.docx
 
The Hardy-Weinberg principleapplies to which populations- Populations.docx
The Hardy-Weinberg principleapplies to which populations- Populations.docxThe Hardy-Weinberg principleapplies to which populations- Populations.docx
The Hardy-Weinberg principleapplies to which populations- Populations.docx
 
The Giant Kelp forests of the US Pacific coast have really cold water-.docx
The Giant Kelp forests of the US Pacific coast have really cold water-.docxThe Giant Kelp forests of the US Pacific coast have really cold water-.docx
The Giant Kelp forests of the US Pacific coast have really cold water-.docx
 
The function T(n) satisfies T(n)-2T(3n)+O(n2)- Which of the following.docx
The function T(n) satisfies T(n)-2T(3n)+O(n2)- Which of the following.docxThe function T(n) satisfies T(n)-2T(3n)+O(n2)- Which of the following.docx
The function T(n) satisfies T(n)-2T(3n)+O(n2)- Which of the following.docx
 
The following table summarizes the ages of a sample of 57 adults that.docx
The following table summarizes the ages of a sample of 57 adults that.docxThe following table summarizes the ages of a sample of 57 adults that.docx
The following table summarizes the ages of a sample of 57 adults that.docx
 
The following table presents output per hour in the country of Mistani.docx
The following table presents output per hour in the country of Mistani.docxThe following table presents output per hour in the country of Mistani.docx
The following table presents output per hour in the country of Mistani.docx
 
The following selected transactions occurred during 2024 and 2025 for.docx
The following selected transactions occurred during 2024 and 2025 for.docxThe following selected transactions occurred during 2024 and 2025 for.docx
The following selected transactions occurred during 2024 and 2025 for.docx
 
The following refer to the following data set- What is the mean (x) of.docx
The following refer to the following data set- What is the mean (x) of.docxThe following refer to the following data set- What is the mean (x) of.docx
The following refer to the following data set- What is the mean (x) of.docx
 
The following questions are based on the case study- The Human Right t.docx
The following questions are based on the case study- The Human Right t.docxThe following questions are based on the case study- The Human Right t.docx
The following questions are based on the case study- The Human Right t.docx
 
The following items are taken from the financial statements of Pharoah.docx
The following items are taken from the financial statements of Pharoah.docxThe following items are taken from the financial statements of Pharoah.docx
The following items are taken from the financial statements of Pharoah.docx
 
The following financial assets appeared in a recent balance sheet of A.docx
The following financial assets appeared in a recent balance sheet of A.docxThe following financial assets appeared in a recent balance sheet of A.docx
The following financial assets appeared in a recent balance sheet of A.docx
 
The following graph shows an aggregate demand (AD) curve and a short-r.docx
The following graph shows an aggregate demand (AD) curve and a short-r.docxThe following graph shows an aggregate demand (AD) curve and a short-r.docx
The following graph shows an aggregate demand (AD) curve and a short-r.docx
 
The first production department of Stone Incorporated reports the foll.docx
The first production department of Stone Incorporated reports the foll.docxThe first production department of Stone Incorporated reports the foll.docx
The first production department of Stone Incorporated reports the foll.docx
 

Recently uploaded

Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
christianmathematics
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 

Recently uploaded (20)

Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 

Chapter 11 Network Security The president of NDAS has just read a new.docx

  • 1. Chapter 11 – Network Security The president of NDAS has just read a newspaper article explaining that the top security threats to companies aren’t always from hackers trying to break in through the corporate firewall. In many cases, companies are more concerned about things such as internal employees and social engineering. After reading this article, he rushed down to Les Coone’s office to understand what could happen to NDAS. Les has turned to you to prepare an analysis of NDAS security. While Les was in your office you mention that a security issue you recently learned about needs to be addressed. Five employees in the Accounts Payable office were recently given two weeks notice of their impending layoff due to the outsourcing of some of the Accounts Payable functions to another company. As you understand it, those five employees aren’t happy with being released. Exercises 1. Prepare a report outlining the major security threats faced by NDAS. Be sure to identify those that you think are major threats and those that are minor threats. 2. Prepare a partial risk assessment for NDAS that includes their major assets, threats, and controls. You will need to make some reasonable assumptions. 3. Develop a set of security controls, for use in the NDAS main office and for its Web site, designed to control risks due to disruption, destruction, and disaster and unauthorized access. 4. Think about the accounts payable employees that are being laid off. What should be done to ensure that they don’t do anything (such as steal customer data files, etc) before they leave the company. With their access to so much accounting data and other network access, list some of the main concerns that you may have. In addition, what will you suggest to mitigate these risks? Solution 1) The major security threats faced by NDAS are : The minor threats may be exposing the information regarding transactions, customer information and inventory. Mostly thee internal threats are minor. 2) The partial risk assessment for NDAS includes the following steps:
  • 2. Consider the dispersed nature of NDAS operations i.e the NDAS offices spread across 16 cities in the country, so focus on all of it. Firstly focus on the major threats that are caused. 3) The set of security protocols to control risks due to disruption, destruction and disaster are as follows: The set of protocols for unauthorised access are: The staff should respond immediately to identify the intruder and to take appropriate action to control threat. 4)