SlideShare a Scribd company logo
Name:
In this assignment, you must answer the “Answer Implying
Guilty,” and the “Answer Implying Not Guilty” questions. Both
responses must start by stating either “Yes” or “No” for each
charge and a brief summary that explains why. One example of
the first question was provided.
IMPORTANT: ALL IMPLYING GUILTY ANSWERS ARE NOT
ALWAYS “NO” RESPONSES AND ALL IMPLYING NOT
GUILTY ANSWERS ARE NOT ALWAYS ‘YES’ RESPONSES.
Question
Answer Implying
Guilty
Answer Implying
Not Guilty
EXAMPLE:
Could other DLP traders have manipulated GEDS’s transaction
systems like Kerviel did?
No, the methods employed by Kerviel were so intricate that no
one else could have replicated them.
Yes, Kerviel did not have to customize the systems in any way
in order to conceal his unauthorized and fictitious trades.
1
Could other DLP traders have manipulated GEDS’s transaction
systems like Kerviel did?
2
Was it typical for middle office employees to be promoted to
the front office?
3
When Kerviel worked in the middle office, did he show any
unusual aptitude for manipulating the transaction systems?
4
Did DLP have any rules or disincentives designed to deter
traders like Kerviel from undertaking unauthorized trading?
5
Why did Kerviel make such huge bets when he did not derive
any personal benefit from the profits?
Complaint Letter
Student name
Institution affiliation
Date
Indicate (Full names,
Address,
City,
Date )
The manager
Wendy’s
888.624.8140
Georgia.
REF: COMPLAIN CONCERNING TOO SPICY-COLD
BACKED POTATO’S
My name is (indicate your full names). I have been your
customer for the last seven months and you have always served
to be quality means and I have always anticipated for more
different dishes in the future. However, the backed potatoes I
was served on 4 March 2020 makes me change my mind. I
believe I deserve better than the quality I was served despite
being loyal to you for the last seven months since I moved to
Georgia. From your slogan, 'Fresh never frozen' I thought I
would always receive fresh well-cooked quality meals. The
baked potato contradicts your slogan.
The freshness of the potatoes remains questionable. Looking
from the colour of the baked potatoes it was a translucent brown
colour. I could tell that the meal was in the heating drawer for
hours. The potatoes were squishy which I believe was caused
because they strayed in the bin all day. I believe this is not how
you should treat you, customers. I have come forward with my
complaint since I want better services in the future if am still
convinced to remain your client. The fact that they were too
spicy in addition to the fact they were not fresh made me sick.
You should not serve your customers with cold meals especially
potatoes. Besides, it is good to ensure that the meals are spiced
right to avoid poisoning your clients. I was not the only client
who suffered due to this service. Make a follow up to improve
this service to keep your clients at prey. I believe that I deserve
a nice free meal of my choice. I deserve the free meal due to the
poor service I received which made me sick.
Yours faithfully
(Your full names)
(Sign)
CHAPTER 11
INFORMATION GOVERNANCE
Information Governance and Information Privacy
& Security Functions
ITS 833
Dr. Mia Simmons
Chapter Overview
■ This chapter will cover pages 207-236 in
your book.
■ This chapter discusses how privacy &
security aligns directly with the success of
Information Governance.
2
Privacy
■ Privacy cannot be protected without implementing proper
security controls and technologies
3
Insider Threat: Malicious or Not
■ Countering the Insider Threat
– Insider threat breaches can be more costly than outsider
breaches
■ Malicious Insider
– Malicious insiders have many methods at their disposal to
harm
the organization by destroying equipment, gaining unsanctioned
access to IP, or removing sensitive information by USB drive,
e-
mail, or other methods.
■ Nonmalicious Insider
– The majority of users indicated having sent out documents
accidentally email
■
Solution
– companies need to take a hard look and see whether they have
any effective IG enforcement and document life cycle security
(DLS) technology such as information rights management (IRM)
in place
4
Privacy Laws
■ Federal Wiretap Act “prohibits the unauthorized interception
and
disclosure of wire, oral, or electronic communications.”
■ United Kingdom, privacy laws and regulations include these:
– Data Protection Act 1998
– Freedom of Information Act 2000
– Public Records Act 1958
– Common law duty of confidentiality
– Confidentiality National Health Service (NHS) Code of
Practice
– NHS Care Record Guarantee for England
– Social Care Record Guarantee for England
– Information Security NHS Code of Practice
– Records Management NHS Code of Practice
■ Redaction is the process of blocking out sensitive fi elds of
information.
5
Limitations of Perimeter Security
■ The perimeter security approach has four fundamental
limitations:
1. Limited effectiveness. Perimeter protection stops dead at the
firewall, even
though sensitive information is sent past it and circulates
around the Web,
unsecured. Today’s extended computing model and the trend
toward global
business means that business enterprises and government
agencies
frequently share sensitive information externally with other
stakeholders,
including business partners, customers, suppliers, and
constituents.
2. Haphazard protections. In the normal course of business,
knowledge workers
send, work on, and store copies of the same information outside
the
organization’s established perimeter. Even if the information’s
new digital
environment is secured by other perimeters, each one utilizes
different access
controls or sometimes no access control at all (e.g., copying a
price list from a
sales folder to a marketing folder; an attorney copying a case
brief or litigation
strategy document from a paralegal’s case folder).
3. Too complex. With this multi-perimeter scenario, there are
simply too many
perimeters to manage, and often they are out of the
organization’s direct
control.
4. No direct protections. Attempts to create boundaries or
portals protected by
perimeter security within which stakeholders (partners,
suppliers,
shareholders, or customers) can share information causes more
complexity
and administrative overhead while it fails to protect the e-
documents and data
directly
6
Controlling Access Using Identity Access
Management
■ IAM—along with sharp IG policies—“manages and governs
user access to
information through an automated, continuous process
■ A robust and effective IAM solution provides for:
– Auditing . Detailed audit trails of g who attempted to access
which
information , and when . Stolen identities can be uncovered if,
for
instance, an authorized user attempts to log in from more than
one
computer at a time.
– Constant updating. Regular reviews of access rights assigned
to
individuals, including review and certification for user access,
an
automated recertification process ( attestation ), and
enforcement of IG
access policies that govern the way users access information in
respect
to segregation of duties.
– Evolving roles. Role life cycle management should be
maintained on a
continuous basis, to mine and manage roles and their associated
access rights and policies.
– Risk reduction. Remediation regarding access to critical
documents
and information
7
Enforcing IG: Protect Files with Rules
and Permissions
■ Rules and permissions specify who (by roles) is allowed
access to which documents and information, and even
contextually from where (office, home, travel) and at what
times (work hours, or extended hours).
■ To effectively wall off and secure information by
management
level, many companies and governments have put in place an
information security framework—a model that delineates
which levels of the organization have access to specifi c
documents and databases as a part of implemented IG policy
8
Apply Better Technology for Better
Enforcement in the Extended Enterprise
■ Protecting E-Documents in the Extended Enterprise
– Sharing e-documents and collaborating are essential in
today’s
increasingly mobile and global world
■ Basic Security for the Microsoft Windows Office Desktop
– A key flaw or caveat is that passwords used in protecting
documents
cannot be retrieved if they are forgotten or lost.
■ Where Do Deleted Files Go?
– Most users are unaware that deleted fi les and fragments of
documents and drafts are stored temporarily on their computer’s
unallocated space.
■ Lock Down: Stop All External Access to Confidential E-
Documents
– these methods are effective in highly classified or restricted
areas
where confidential e-documents are held.
9
Apply Better Technology for Better
Enforcement in the Extended Enterprise
■ Secure Printing
– You simply invoke some standard Microsoft Office
protections,
which allow you to print the documents once you arrive in the
copy
room or at the networked printer.
■ Serious Security Issues with Large Print Files of Confidential
Data
– To help secure print fi les, specialized hardware devices
designed to
sit between the print server and the network and cloak server
print
files are visible only to those who have a cloaking device on the
other
end
10
Secure Communications Using
Record-Free E-Mail
■ Stream messaging is a simple, safe, secure electronic
communications
system ideal for ensuring that sensitive internal information is
kept
confidential and not publicly released
■ Stream messaging separates the sender’s and receiver’s names
and
the date from the body of the message, never allowing them to
be seen
together. Even if the sender or receiver were to attempt to make
a copy
using the print-screen function, these elements are never
captured
together
■ Stream messaging is unique because its technology effectively
eliminates the ability to print, cut, paste, forward, or save a
message.
11
Digital Signatures
■ A digital signature provides evidence in demonstrating to a
third party
that the signature was genuine, true, and authentic, which is
known as
nonrepudiation
■ Digital signatures can be implemented a variety of ways—not
just
through software but also through firmware (programmed
microchips),
computer hardware, or a combination of the three.
■ A formal, trusted certificate authority (CA) issues the
certificate
associated with the public-private key.
12
Document Encryption
■ There are e-records management implications of employing
document
encryption:
– Unless it is absolutely essential, full document encryption is
often
advised against for use within electronic records management
systems as it prevents full-text indexing, and requires that the
decryption keys (and application) are available for any future
access. Furthermore, if the decryption key is lost or
13
Data Loss Prevention (DLP)
Technology
■ The aforementioned document security challenges have given
rise to an
emerging but critical set of capabilities by a new breed of IT
companies
that provide data loss prevention (DLP) (also called data leak
prevention).
■ Basic DLP Methods DLP solutions typically apply one of
three methods:
1. Scanning traffic for keywords or regular expressions, such as
customer credit card or Social Security numbers.
2. Classifying documents and content based on a predefined set
to
determine what is likely to be confidential and what is not.
3. Tainting (in the case of agent-based solutions), whereby
documents
are tagged and then monitored to determine how to classify
derivative documents. For example, if someone copies a portion
of
a sensitive document into a different document, this document
receives the same security clearance as the original document.
14
Missing Piece: Information Rights
Management (IRM
■ “IRM” when referring to this technology set, so as not to be
confused with
electronic records management. Major software companies also
use the
term “IRM.”
■ The ability to apply security to an e-document in any state
(in use, in
motion, and at rest), across media types, inside or outside of the
organization, is called persistent security.
■ Three requirements are recommended to ensure effective
IRM:
1. Security is foremost; documents, communications, and
licenses
should be encrypted, and documents should require
authorization
before being altered.
2. The system can’t be any harder to use than working with
unprotected documents.
3. It must be easy to deploy and manage , scale to enterprise
proportions, and work with a variety of common desktop
applications
15
Policy Creation and Management
■ IG policy defined for a document type includes these
following controls:
1. Viewing
2. Editing
3. Copy/Paste (including screen capture)
4. Printing
5. Forwarding e-mail containing secured e-documents
■ Decentralized Administration
– One of the key challenges of e-document security traditionally
is that a
system administrator had access to documents and reports
■ Integration
– The best approach is to target one critical department or area
with a
strong business need and to keep the scope of the project narrow
to
gain an early success before expanding the implementation into
other
departments.
– IRM embeds protection into the data (using encryption
technology),
allowing fi les to protect themselves.
16
Embedded Protection
■ Locking down data involved encryption in one form or
another:
1. E-mail encryption
2. File encryption
3. Full Disk Encryption (FDE)
4. Enterprise wide encryption
■ These encryption solutions can be divided into two
categories:
1. encryption in transit (e.g., e-mail encryption)
2. encryption t at rest (e.g., FDE)
17
Approaches for Securing Data Once It
Leaves the Organization
■ Forrester has developed a new network architecture that
builds security
into the DNA of a network, using a mixture of five data security
design
patterns:
1. Thin client. Access information online only, with no local
operations, using a diskless terminal that cannot store data,
documents, or programs so confidential information stays stored
and secured centrally.
2. Thin device. Devices such as smartphones, which have
limited
computing resources, Web surfing, e-mail, and basic Web apps
that locally conduct no real information processing, are
categorized as thin devices.
3. Protected process. This approach allows local processing
with a
PC where confidential e-documents and data are stored and
processed in a partition that is highly secure and controlled.
4. Protected data. Deploying IRM and embedding security into
the
documents (or data) provides complete DLS
5. Eye in the sky.
18
Document Labeling
■ Document Labeling
– Document labeling is “an easy way to g increase user
awareness about the sensitivity of information in a
document
– The challenge is to standardize and formalize the
process of getting the label onto the document—
enterprisewide
■ Document Analytics
– Document analytics allows a compliance officer or
system administrator to view exactly how many
documents a user accesses in a day and how many
documents the user accesses on average
19
Confidential Stream Messaging
■ The ePolicy Institute offers seven steps to controlling stream
messaging:
1. Work with your legal counsel to define “business record” for
your
organization on a companywide basis.
2. Work with your legal counsel to determine when, how, why,
and with
whom confidential stream messaging is the most appropriate,
effective— and legally compliant—way to hold recordless,
confidential
business discussions when permanent records are not required.
3. In order to preserve attorney-client privilege, a phone call or
confidential electronic messaging may be preferable to email.
4. Define key terms for employees.
5. Implement written rules and policies governing the use of
email and
confidential stream messaging.
6. Distribute a hard copy of the new confidential messaging
policy, email
policy and other electronic communications (e.g., social media,
blogs)..
7. Educate, educate, educate. Ensure that all employees who
need to
know the difference between email which leaves a potential
business
record and stream messaging which does not, and is confidential
20
Chapter Summary
■ Data governance software is another tool that looks at who is
accessing which documents
and creates a matrix of roles and access along behavioral lines.
■ Encrypting sensitive e-mail messages is an effective step to
securing confidential
information assets while in transit. Encryption can be applied to
desktop folders and fi les.
■ For e-mail communication with no trace or record, stream
messaging is a solution.
■ Digital signatures authenticate the identity of the signatory
and prove that the signature
was, in fact, generated by the claimed signatory. This is known
as nonrepudiation.
■ Data loss prevention technology performs a “deep content
inspection” of all e-documents
and e-mails before they leave the organization’s perimeter to
stop sensitive data from exiting
the firewall.
■ DLP can be used to discover the flow of information within
an organization. Additional
security tools can then be applied. This may be the best use for
DLP.
■ Information rights management software enforces and
manages use rights of electronic
documents. IRM provides a sort of security wrapper around
documents and protects
sensitive information assets from unauthorized use or copying.
IRM is also known as
enterprise rights management.
■ Persistent security tools like IRM should be enforced on price
lists, proprietary blueprints,
and CAD designs. Printing these documents should be highly
restricted.
■ Most legacy or first-to-market providers of IRM focused on
internal sharing and are heavily
dependent on Microsoft Active Directory and lightweight
directory access protocol (LDAP) for
authentication. These early solutions were not built for cloud
use or the distributed
enterprises of today, where mobile devices are proliferating.
21
Information Governance
Chapter 11
Complete Week 10 Objectives
School of Computer & Information Sciences
ITS 835
Chapter 23, “Control Complacency Rogue Trading at Société
Générale”
This is a narrated presentation.
Overview
• Kerviel’s Trail – A Media Circus
• Société Générale – The Rise of Trading
• Jerome Kerviel
• Discovery, Damage Control, and Retribution
– Postmortem
– Managerial Supervision
– Control Environment
– System Reliability
– Risk-Sensitive Culture
• What Actually Happened
Kerviel’s Trail – A Media Circus
• Criminal trial of 33-year Jerome Kerviel started in Paris’s
Palais de Justice. Charges were forgery,
abuse of trust, and illegal use of computers. Caused losses to
Société Générale's losses and the
commencement of the trail, media attention was at a high
because Kerviel claimed he was a
scapegoat for high-risk trading practices that were condoned by
Société Générale when profitable.
• Société Générale maintained that Kerviel was a rogue trader
who single-handedly developed
methods to conduct unauthorized trading without being detected
and used them to take massive
trading positions that ultimately backfired when markets turned
against him.
• Global financial markets were slow recovering from the 2008
crisis, but memories of Société
Générale trading losses remined vivid because at the time of its
announcement in 2008 the incident
seemed to confirm investors' worst fears that banks in general
were taking massive amounts of risk
far beyond their traditional lines of business.
Société Générale – The Rise of Trading
• Société Générale, 1999 through 2006, had a net income
increase of 164 percent from €2 billion
annually to €5.2 billion. Its retail and investment management
businesses both prospered during this
period, with the main drivers of this higher profitability was its
Corporate and Investment Banking
(CIB) division, whose net income increased 230 percent, from
€708 million annually to €2.3 billion.
• Société Générale was not alone pursing growth in the early
2000s through expansion of its trading
and capital markets business. Its larger rival, BNP Paribas,
adopted the same strategy, as did other
major banks in other countries such as the United Kingdom,
Germany, and United States.
• With other major, this strategy backfired when their fixed
income desks became deeply involved in
structuring, selling, and trading credit derivatives and debt
securities backed by U.S. residential
mortgages and were unable to avoid massive write-downs and
funding crises when global credit
markets seized up in the second half of 2008.
Jerome Kerviel
• Kerviels position in Société Générale CIB was unlikely to be
noticed because he was one of seven
traders in the Delta One Listed Products (DLP) team, a part of
the Equity Finance section in the Equity
Arbitrage group of the CIB’s Global Equities & Derivative

More Related Content

Similar to NameIn this assignment, you must answer the Answer Implying .docx

A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
gppcpa
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
saurnou
 
IT Policy
IT PolicyIT Policy
IT Policy
Sherri Booher
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
Jack Pringle
 
д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...
д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...
д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...
Natasha Khramtsovsky
 
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...
Natasha Khramtsovsky
 
cybersecurity
cybersecurity cybersecurity
cybersecurity
AkshaySajith3
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless World
Qualys
 
Hippa powerpoint 92613
Hippa powerpoint 92613Hippa powerpoint 92613
Hippa powerpoint 92613
Ravinia Hayes-Cozier
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
RECIPA
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
shinydey
 
Harshit security
Harshit securityHarshit security
Harshit security
HarshitGupta435
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
MTG IT Professionals
 
IT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsIT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsAndrew S. Baker (ASB)
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
Meg Weber
 

Similar to NameIn this assignment, you must answer the Answer Implying .docx (20)

A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
IT Policy
IT PolicyIT Policy
IT Policy
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
 
it-security.ppt
it-security.pptit-security.ppt
it-security.ppt
 
д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...
д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...
д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...
 
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...
 
cybersecurity
cybersecurity cybersecurity
cybersecurity
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless World
 
Hippa powerpoint 92613
Hippa powerpoint 92613Hippa powerpoint 92613
Hippa powerpoint 92613
 
Hippa powerpoint 92613
Hippa powerpoint 92613Hippa powerpoint 92613
Hippa powerpoint 92613
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
Harshit security
Harshit securityHarshit security
Harshit security
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
IT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsIT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and Tools
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Teaching Your Staff About Phishing
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 

More from gemaherd

Natural Selection and Patterns of Evolution WorksheetComplet.docx
Natural Selection and Patterns of Evolution WorksheetComplet.docxNatural Selection and Patterns of Evolution WorksheetComplet.docx
Natural Selection and Patterns of Evolution WorksheetComplet.docx
gemaherd
 
Navigate to the Pearson Assessment website. Identify an assessme.docx
Navigate to the Pearson Assessment website. Identify an assessme.docxNavigate to the Pearson Assessment website. Identify an assessme.docx
Navigate to the Pearson Assessment website. Identify an assessme.docx
gemaherd
 
Need a reply 1Amy Simons is an aunt to my mum. Amy passed on.docx
Need a reply 1Amy Simons is an aunt to my mum. Amy passed on.docxNeed a reply 1Amy Simons is an aunt to my mum. Amy passed on.docx
Need a reply 1Amy Simons is an aunt to my mum. Amy passed on.docx
gemaherd
 
Need a PowerPoint 12 pages on the following nursing theory   Peacefu.docx
Need a PowerPoint 12 pages on the following nursing theory   Peacefu.docxNeed a PowerPoint 12 pages on the following nursing theory   Peacefu.docx
Need a PowerPoint 12 pages on the following nursing theory   Peacefu.docx
gemaherd
 
Need 5 papers along with reference page Topic Delay in Phys.docx
Need 5 papers along with reference page Topic Delay in Phys.docxNeed 5 papers along with reference page Topic Delay in Phys.docx
Need 5 papers along with reference page Topic Delay in Phys.docx
gemaherd
 
Need 6 pages with APA format and referencesThere are several e.docx
Need 6 pages with APA format and referencesThere are several e.docxNeed 6 pages with APA format and referencesThere are several e.docx
Need 6 pages with APA format and referencesThere are several e.docx
gemaherd
 
need a research paper about leadership in 10 pages with 10 reference.docx
need a research paper about leadership in 10 pages with 10 reference.docxneed a research paper about leadership in 10 pages with 10 reference.docx
need a research paper about leadership in 10 pages with 10 reference.docx
gemaherd
 
Need a QUALITATIVE Journal, The topic is up to you as long as yo.docx
Need a QUALITATIVE Journal, The topic is up to you as long as yo.docxNeed a QUALITATIVE Journal, The topic is up to you as long as yo.docx
Need a QUALITATIVE Journal, The topic is up to you as long as yo.docx
gemaherd
 
Need a one response for each discussion post in 50 to 75 words.docx
Need a one response for each discussion post in 50 to 75 words.docxNeed a one response for each discussion post in 50 to 75 words.docx
Need a one response for each discussion post in 50 to 75 words.docx
gemaherd
 
Need 20 -25 pages Identify the key problems and issues in .docx
Need 20 -25 pages Identify the key problems and issues in .docxNeed 20 -25 pages Identify the key problems and issues in .docx
Need 20 -25 pages Identify the key problems and issues in .docx
gemaherd
 
Need a research paper with ANY ONE of the below topicsT.docx
Need a research paper with ANY ONE of the below topicsT.docxNeed a research paper with ANY ONE of the below topicsT.docx
Need a research paper with ANY ONE of the below topicsT.docx
gemaherd
 
Necesito un essay en espanolTema   Explique algunas de las inst.docx
Necesito un essay en espanolTema   Explique algunas de las inst.docxNecesito un essay en espanolTema   Explique algunas de las inst.docx
Necesito un essay en espanolTema   Explique algunas de las inst.docx
gemaherd
 
Need 400 wordsBy October of 2017, Yahoo estimated that 3 billion.docx
Need 400 wordsBy October of 2017, Yahoo estimated that 3 billion.docxNeed 400 wordsBy October of 2017, Yahoo estimated that 3 billion.docx
Need 400 wordsBy October of 2017, Yahoo estimated that 3 billion.docx
gemaherd
 
Need 1500 words  Dissertationresearch method on the impact of C.docx
Need 1500 words  Dissertationresearch method on the impact of C.docxNeed 1500 words  Dissertationresearch method on the impact of C.docx
Need 1500 words  Dissertationresearch method on the impact of C.docx
gemaherd
 
Need 250 words Initial Post and two replies of 100 words each. Will .docx
Need 250 words Initial Post and two replies of 100 words each. Will .docxNeed 250 words Initial Post and two replies of 100 words each. Will .docx
Need 250 words Initial Post and two replies of 100 words each. Will .docx
gemaherd
 
Nazi GermanyBrenda Thomas LaShuntae JacksonThe R.docx
Nazi GermanyBrenda Thomas LaShuntae JacksonThe R.docxNazi GermanyBrenda Thomas LaShuntae JacksonThe R.docx
Nazi GermanyBrenda Thomas LaShuntae JacksonThe R.docx
gemaherd
 
Need a paper with atleast 1000 - 1200 words.you can find the del.docx
Need a paper with atleast 1000 - 1200 words.you can find the del.docxNeed a paper with atleast 1000 - 1200 words.you can find the del.docx
Need a paper with atleast 1000 - 1200 words.you can find the del.docx
gemaherd
 
Necesito un Essay en español, alguien puede ayudarmeTema ¿Cuál.docx
Necesito un Essay en español, alguien puede ayudarmeTema ¿Cuál.docxNecesito un Essay en español, alguien puede ayudarmeTema ¿Cuál.docx
Necesito un Essay en español, alguien puede ayudarmeTema ¿Cuál.docx
gemaherd
 
Nature GeNetics  VOLUME 46 NUMBER 10 OCTOBER 2014 1 0 8 9.docx
Nature GeNetics  VOLUME 46  NUMBER 10  OCTOBER 2014 1 0 8 9.docxNature GeNetics  VOLUME 46  NUMBER 10  OCTOBER 2014 1 0 8 9.docx
Nature GeNetics  VOLUME 46 NUMBER 10 OCTOBER 2014 1 0 8 9.docx
gemaherd
 
Nature VS NurtureResearch writing 310Joi Tucker.docx
Nature VS NurtureResearch writing 310Joi Tucker.docxNature VS NurtureResearch writing 310Joi Tucker.docx
Nature VS NurtureResearch writing 310Joi Tucker.docx
gemaherd
 

More from gemaherd (20)

Natural Selection and Patterns of Evolution WorksheetComplet.docx
Natural Selection and Patterns of Evolution WorksheetComplet.docxNatural Selection and Patterns of Evolution WorksheetComplet.docx
Natural Selection and Patterns of Evolution WorksheetComplet.docx
 
Navigate to the Pearson Assessment website. Identify an assessme.docx
Navigate to the Pearson Assessment website. Identify an assessme.docxNavigate to the Pearson Assessment website. Identify an assessme.docx
Navigate to the Pearson Assessment website. Identify an assessme.docx
 
Need a reply 1Amy Simons is an aunt to my mum. Amy passed on.docx
Need a reply 1Amy Simons is an aunt to my mum. Amy passed on.docxNeed a reply 1Amy Simons is an aunt to my mum. Amy passed on.docx
Need a reply 1Amy Simons is an aunt to my mum. Amy passed on.docx
 
Need a PowerPoint 12 pages on the following nursing theory   Peacefu.docx
Need a PowerPoint 12 pages on the following nursing theory   Peacefu.docxNeed a PowerPoint 12 pages on the following nursing theory   Peacefu.docx
Need a PowerPoint 12 pages on the following nursing theory   Peacefu.docx
 
Need 5 papers along with reference page Topic Delay in Phys.docx
Need 5 papers along with reference page Topic Delay in Phys.docxNeed 5 papers along with reference page Topic Delay in Phys.docx
Need 5 papers along with reference page Topic Delay in Phys.docx
 
Need 6 pages with APA format and referencesThere are several e.docx
Need 6 pages with APA format and referencesThere are several e.docxNeed 6 pages with APA format and referencesThere are several e.docx
Need 6 pages with APA format and referencesThere are several e.docx
 
need a research paper about leadership in 10 pages with 10 reference.docx
need a research paper about leadership in 10 pages with 10 reference.docxneed a research paper about leadership in 10 pages with 10 reference.docx
need a research paper about leadership in 10 pages with 10 reference.docx
 
Need a QUALITATIVE Journal, The topic is up to you as long as yo.docx
Need a QUALITATIVE Journal, The topic is up to you as long as yo.docxNeed a QUALITATIVE Journal, The topic is up to you as long as yo.docx
Need a QUALITATIVE Journal, The topic is up to you as long as yo.docx
 
Need a one response for each discussion post in 50 to 75 words.docx
Need a one response for each discussion post in 50 to 75 words.docxNeed a one response for each discussion post in 50 to 75 words.docx
Need a one response for each discussion post in 50 to 75 words.docx
 
Need 20 -25 pages Identify the key problems and issues in .docx
Need 20 -25 pages Identify the key problems and issues in .docxNeed 20 -25 pages Identify the key problems and issues in .docx
Need 20 -25 pages Identify the key problems and issues in .docx
 
Need a research paper with ANY ONE of the below topicsT.docx
Need a research paper with ANY ONE of the below topicsT.docxNeed a research paper with ANY ONE of the below topicsT.docx
Need a research paper with ANY ONE of the below topicsT.docx
 
Necesito un essay en espanolTema   Explique algunas de las inst.docx
Necesito un essay en espanolTema   Explique algunas de las inst.docxNecesito un essay en espanolTema   Explique algunas de las inst.docx
Necesito un essay en espanolTema   Explique algunas de las inst.docx
 
Need 400 wordsBy October of 2017, Yahoo estimated that 3 billion.docx
Need 400 wordsBy October of 2017, Yahoo estimated that 3 billion.docxNeed 400 wordsBy October of 2017, Yahoo estimated that 3 billion.docx
Need 400 wordsBy October of 2017, Yahoo estimated that 3 billion.docx
 
Need 1500 words  Dissertationresearch method on the impact of C.docx
Need 1500 words  Dissertationresearch method on the impact of C.docxNeed 1500 words  Dissertationresearch method on the impact of C.docx
Need 1500 words  Dissertationresearch method on the impact of C.docx
 
Need 250 words Initial Post and two replies of 100 words each. Will .docx
Need 250 words Initial Post and two replies of 100 words each. Will .docxNeed 250 words Initial Post and two replies of 100 words each. Will .docx
Need 250 words Initial Post and two replies of 100 words each. Will .docx
 
Nazi GermanyBrenda Thomas LaShuntae JacksonThe R.docx
Nazi GermanyBrenda Thomas LaShuntae JacksonThe R.docxNazi GermanyBrenda Thomas LaShuntae JacksonThe R.docx
Nazi GermanyBrenda Thomas LaShuntae JacksonThe R.docx
 
Need a paper with atleast 1000 - 1200 words.you can find the del.docx
Need a paper with atleast 1000 - 1200 words.you can find the del.docxNeed a paper with atleast 1000 - 1200 words.you can find the del.docx
Need a paper with atleast 1000 - 1200 words.you can find the del.docx
 
Necesito un Essay en español, alguien puede ayudarmeTema ¿Cuál.docx
Necesito un Essay en español, alguien puede ayudarmeTema ¿Cuál.docxNecesito un Essay en español, alguien puede ayudarmeTema ¿Cuál.docx
Necesito un Essay en español, alguien puede ayudarmeTema ¿Cuál.docx
 
Nature GeNetics  VOLUME 46 NUMBER 10 OCTOBER 2014 1 0 8 9.docx
Nature GeNetics  VOLUME 46  NUMBER 10  OCTOBER 2014 1 0 8 9.docxNature GeNetics  VOLUME 46  NUMBER 10  OCTOBER 2014 1 0 8 9.docx
Nature GeNetics  VOLUME 46 NUMBER 10 OCTOBER 2014 1 0 8 9.docx
 
Nature VS NurtureResearch writing 310Joi Tucker.docx
Nature VS NurtureResearch writing 310Joi Tucker.docxNature VS NurtureResearch writing 310Joi Tucker.docx
Nature VS NurtureResearch writing 310Joi Tucker.docx
 

Recently uploaded

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 

Recently uploaded (20)

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 

NameIn this assignment, you must answer the Answer Implying .docx

  • 1. Name: In this assignment, you must answer the “Answer Implying Guilty,” and the “Answer Implying Not Guilty” questions. Both responses must start by stating either “Yes” or “No” for each charge and a brief summary that explains why. One example of the first question was provided. IMPORTANT: ALL IMPLYING GUILTY ANSWERS ARE NOT ALWAYS “NO” RESPONSES AND ALL IMPLYING NOT GUILTY ANSWERS ARE NOT ALWAYS ‘YES’ RESPONSES. Question Answer Implying Guilty Answer Implying Not Guilty EXAMPLE: Could other DLP traders have manipulated GEDS’s transaction systems like Kerviel did? No, the methods employed by Kerviel were so intricate that no one else could have replicated them. Yes, Kerviel did not have to customize the systems in any way in order to conceal his unauthorized and fictitious trades. 1 Could other DLP traders have manipulated GEDS’s transaction systems like Kerviel did? 2 Was it typical for middle office employees to be promoted to the front office?
  • 2. 3 When Kerviel worked in the middle office, did he show any unusual aptitude for manipulating the transaction systems? 4 Did DLP have any rules or disincentives designed to deter traders like Kerviel from undertaking unauthorized trading? 5 Why did Kerviel make such huge bets when he did not derive any personal benefit from the profits? Complaint Letter Student name Institution affiliation Date Indicate (Full names, Address, City, Date ) The manager Wendy’s 888.624.8140
  • 3. Georgia. REF: COMPLAIN CONCERNING TOO SPICY-COLD BACKED POTATO’S My name is (indicate your full names). I have been your customer for the last seven months and you have always served to be quality means and I have always anticipated for more different dishes in the future. However, the backed potatoes I was served on 4 March 2020 makes me change my mind. I believe I deserve better than the quality I was served despite being loyal to you for the last seven months since I moved to Georgia. From your slogan, 'Fresh never frozen' I thought I would always receive fresh well-cooked quality meals. The baked potato contradicts your slogan. The freshness of the potatoes remains questionable. Looking from the colour of the baked potatoes it was a translucent brown colour. I could tell that the meal was in the heating drawer for hours. The potatoes were squishy which I believe was caused because they strayed in the bin all day. I believe this is not how you should treat you, customers. I have come forward with my complaint since I want better services in the future if am still convinced to remain your client. The fact that they were too spicy in addition to the fact they were not fresh made me sick. You should not serve your customers with cold meals especially potatoes. Besides, it is good to ensure that the meals are spiced right to avoid poisoning your clients. I was not the only client who suffered due to this service. Make a follow up to improve this service to keep your clients at prey. I believe that I deserve a nice free meal of my choice. I deserve the free meal due to the poor service I received which made me sick. Yours faithfully (Your full names) (Sign)
  • 4. CHAPTER 11 INFORMATION GOVERNANCE Information Governance and Information Privacy & Security Functions ITS 833 Dr. Mia Simmons Chapter Overview ■ This chapter will cover pages 207-236 in your book. ■ This chapter discusses how privacy & security aligns directly with the success of Information Governance. 2 Privacy ■ Privacy cannot be protected without implementing proper security controls and technologies 3
  • 5. Insider Threat: Malicious or Not ■ Countering the Insider Threat – Insider threat breaches can be more costly than outsider breaches ■ Malicious Insider – Malicious insiders have many methods at their disposal to harm the organization by destroying equipment, gaining unsanctioned access to IP, or removing sensitive information by USB drive, e- mail, or other methods. ■ Nonmalicious Insider – The majority of users indicated having sent out documents accidentally email ■ Solution – companies need to take a hard look and see whether they have any effective IG enforcement and document life cycle security (DLS) technology such as information rights management (IRM)
  • 6. in place 4 Privacy Laws ■ Federal Wiretap Act “prohibits the unauthorized interception and disclosure of wire, oral, or electronic communications.” ■ United Kingdom, privacy laws and regulations include these: – Data Protection Act 1998 – Freedom of Information Act 2000 – Public Records Act 1958 – Common law duty of confidentiality – Confidentiality National Health Service (NHS) Code of Practice
  • 7. – NHS Care Record Guarantee for England – Social Care Record Guarantee for England – Information Security NHS Code of Practice – Records Management NHS Code of Practice ■ Redaction is the process of blocking out sensitive fi elds of information. 5 Limitations of Perimeter Security ■ The perimeter security approach has four fundamental limitations: 1. Limited effectiveness. Perimeter protection stops dead at the firewall, even though sensitive information is sent past it and circulates around the Web, unsecured. Today’s extended computing model and the trend
  • 8. toward global business means that business enterprises and government agencies frequently share sensitive information externally with other stakeholders, including business partners, customers, suppliers, and constituents. 2. Haphazard protections. In the normal course of business, knowledge workers send, work on, and store copies of the same information outside the organization’s established perimeter. Even if the information’s new digital environment is secured by other perimeters, each one utilizes different access controls or sometimes no access control at all (e.g., copying a price list from a sales folder to a marketing folder; an attorney copying a case brief or litigation strategy document from a paralegal’s case folder). 3. Too complex. With this multi-perimeter scenario, there are simply too many perimeters to manage, and often they are out of the
  • 9. organization’s direct control. 4. No direct protections. Attempts to create boundaries or portals protected by perimeter security within which stakeholders (partners, suppliers, shareholders, or customers) can share information causes more complexity and administrative overhead while it fails to protect the e- documents and data directly 6 Controlling Access Using Identity Access Management ■ IAM—along with sharp IG policies—“manages and governs user access to information through an automated, continuous process ■ A robust and effective IAM solution provides for:
  • 10. – Auditing . Detailed audit trails of g who attempted to access which information , and when . Stolen identities can be uncovered if, for instance, an authorized user attempts to log in from more than one computer at a time. – Constant updating. Regular reviews of access rights assigned to individuals, including review and certification for user access, an automated recertification process ( attestation ), and enforcement of IG access policies that govern the way users access information in respect to segregation of duties. – Evolving roles. Role life cycle management should be maintained on a continuous basis, to mine and manage roles and their associated access rights and policies. – Risk reduction. Remediation regarding access to critical
  • 11. documents and information 7 Enforcing IG: Protect Files with Rules and Permissions ■ Rules and permissions specify who (by roles) is allowed access to which documents and information, and even contextually from where (office, home, travel) and at what times (work hours, or extended hours). ■ To effectively wall off and secure information by management level, many companies and governments have put in place an information security framework—a model that delineates
  • 12. which levels of the organization have access to specifi c documents and databases as a part of implemented IG policy 8 Apply Better Technology for Better Enforcement in the Extended Enterprise ■ Protecting E-Documents in the Extended Enterprise – Sharing e-documents and collaborating are essential in today’s increasingly mobile and global world ■ Basic Security for the Microsoft Windows Office Desktop – A key flaw or caveat is that passwords used in protecting documents cannot be retrieved if they are forgotten or lost.
  • 13. ■ Where Do Deleted Files Go? – Most users are unaware that deleted fi les and fragments of documents and drafts are stored temporarily on their computer’s unallocated space. ■ Lock Down: Stop All External Access to Confidential E- Documents – these methods are effective in highly classified or restricted areas where confidential e-documents are held. 9 Apply Better Technology for Better Enforcement in the Extended Enterprise ■ Secure Printing
  • 14. – You simply invoke some standard Microsoft Office protections, which allow you to print the documents once you arrive in the copy room or at the networked printer. ■ Serious Security Issues with Large Print Files of Confidential Data – To help secure print fi les, specialized hardware devices designed to sit between the print server and the network and cloak server print files are visible only to those who have a cloaking device on the other end 10
  • 15. Secure Communications Using Record-Free E-Mail ■ Stream messaging is a simple, safe, secure electronic communications system ideal for ensuring that sensitive internal information is kept confidential and not publicly released ■ Stream messaging separates the sender’s and receiver’s names and the date from the body of the message, never allowing them to be seen together. Even if the sender or receiver were to attempt to make a copy using the print-screen function, these elements are never captured together
  • 16. ■ Stream messaging is unique because its technology effectively eliminates the ability to print, cut, paste, forward, or save a message. 11 Digital Signatures ■ A digital signature provides evidence in demonstrating to a third party that the signature was genuine, true, and authentic, which is known as nonrepudiation ■ Digital signatures can be implemented a variety of ways—not just through software but also through firmware (programmed microchips),
  • 17. computer hardware, or a combination of the three. ■ A formal, trusted certificate authority (CA) issues the certificate associated with the public-private key. 12 Document Encryption ■ There are e-records management implications of employing document encryption: – Unless it is absolutely essential, full document encryption is often advised against for use within electronic records management systems as it prevents full-text indexing, and requires that the
  • 18. decryption keys (and application) are available for any future access. Furthermore, if the decryption key is lost or 13 Data Loss Prevention (DLP) Technology ■ The aforementioned document security challenges have given rise to an emerging but critical set of capabilities by a new breed of IT companies that provide data loss prevention (DLP) (also called data leak prevention). ■ Basic DLP Methods DLP solutions typically apply one of three methods:
  • 19. 1. Scanning traffic for keywords or regular expressions, such as customer credit card or Social Security numbers. 2. Classifying documents and content based on a predefined set to determine what is likely to be confidential and what is not. 3. Tainting (in the case of agent-based solutions), whereby documents are tagged and then monitored to determine how to classify derivative documents. For example, if someone copies a portion of a sensitive document into a different document, this document receives the same security clearance as the original document. 14
  • 20. Missing Piece: Information Rights Management (IRM ■ “IRM” when referring to this technology set, so as not to be confused with electronic records management. Major software companies also use the term “IRM.” ■ The ability to apply security to an e-document in any state (in use, in motion, and at rest), across media types, inside or outside of the organization, is called persistent security. ■ Three requirements are recommended to ensure effective IRM: 1. Security is foremost; documents, communications, and licenses should be encrypted, and documents should require authorization before being altered. 2. The system can’t be any harder to use than working with unprotected documents.
  • 21. 3. It must be easy to deploy and manage , scale to enterprise proportions, and work with a variety of common desktop applications 15 Policy Creation and Management ■ IG policy defined for a document type includes these following controls: 1. Viewing 2. Editing 3. Copy/Paste (including screen capture) 4. Printing 5. Forwarding e-mail containing secured e-documents ■ Decentralized Administration
  • 22. – One of the key challenges of e-document security traditionally is that a system administrator had access to documents and reports ■ Integration – The best approach is to target one critical department or area with a strong business need and to keep the scope of the project narrow to gain an early success before expanding the implementation into other departments. – IRM embeds protection into the data (using encryption technology), allowing fi les to protect themselves. 16 Embedded Protection ■ Locking down data involved encryption in one form or
  • 23. another: 1. E-mail encryption 2. File encryption 3. Full Disk Encryption (FDE) 4. Enterprise wide encryption ■ These encryption solutions can be divided into two categories: 1. encryption in transit (e.g., e-mail encryption) 2. encryption t at rest (e.g., FDE) 17 Approaches for Securing Data Once It Leaves the Organization ■ Forrester has developed a new network architecture that
  • 24. builds security into the DNA of a network, using a mixture of five data security design patterns: 1. Thin client. Access information online only, with no local operations, using a diskless terminal that cannot store data, documents, or programs so confidential information stays stored and secured centrally. 2. Thin device. Devices such as smartphones, which have limited computing resources, Web surfing, e-mail, and basic Web apps that locally conduct no real information processing, are categorized as thin devices. 3. Protected process. This approach allows local processing with a PC where confidential e-documents and data are stored and processed in a partition that is highly secure and controlled. 4. Protected data. Deploying IRM and embedding security into the documents (or data) provides complete DLS
  • 25. 5. Eye in the sky. 18 Document Labeling ■ Document Labeling – Document labeling is “an easy way to g increase user awareness about the sensitivity of information in a document – The challenge is to standardize and formalize the process of getting the label onto the document— enterprisewide ■ Document Analytics – Document analytics allows a compliance officer or
  • 26. system administrator to view exactly how many documents a user accesses in a day and how many documents the user accesses on average 19 Confidential Stream Messaging ■ The ePolicy Institute offers seven steps to controlling stream messaging: 1. Work with your legal counsel to define “business record” for your organization on a companywide basis. 2. Work with your legal counsel to determine when, how, why, and with whom confidential stream messaging is the most appropriate, effective— and legally compliant—way to hold recordless,
  • 27. confidential business discussions when permanent records are not required. 3. In order to preserve attorney-client privilege, a phone call or confidential electronic messaging may be preferable to email. 4. Define key terms for employees. 5. Implement written rules and policies governing the use of email and confidential stream messaging. 6. Distribute a hard copy of the new confidential messaging policy, email policy and other electronic communications (e.g., social media, blogs).. 7. Educate, educate, educate. Ensure that all employees who need to know the difference between email which leaves a potential
  • 28. business record and stream messaging which does not, and is confidential 20 Chapter Summary ■ Data governance software is another tool that looks at who is accessing which documents and creates a matrix of roles and access along behavioral lines. ■ Encrypting sensitive e-mail messages is an effective step to securing confidential information assets while in transit. Encryption can be applied to desktop folders and fi les. ■ For e-mail communication with no trace or record, stream messaging is a solution. ■ Digital signatures authenticate the identity of the signatory and prove that the signature was, in fact, generated by the claimed signatory. This is known
  • 29. as nonrepudiation. ■ Data loss prevention technology performs a “deep content inspection” of all e-documents and e-mails before they leave the organization’s perimeter to stop sensitive data from exiting the firewall. ■ DLP can be used to discover the flow of information within an organization. Additional security tools can then be applied. This may be the best use for DLP. ■ Information rights management software enforces and manages use rights of electronic documents. IRM provides a sort of security wrapper around documents and protects sensitive information assets from unauthorized use or copying. IRM is also known as enterprise rights management. ■ Persistent security tools like IRM should be enforced on price lists, proprietary blueprints, and CAD designs. Printing these documents should be highly restricted.
  • 30. ■ Most legacy or first-to-market providers of IRM focused on internal sharing and are heavily dependent on Microsoft Active Directory and lightweight directory access protocol (LDAP) for authentication. These early solutions were not built for cloud use or the distributed enterprises of today, where mobile devices are proliferating. 21 Information Governance Chapter 11 Complete Week 10 Objectives School of Computer & Information Sciences ITS 835
  • 31. Chapter 23, “Control Complacency Rogue Trading at Société Générale” This is a narrated presentation. Overview • Kerviel’s Trail – A Media Circus • Société Générale – The Rise of Trading • Jerome Kerviel • Discovery, Damage Control, and Retribution – Postmortem – Managerial Supervision – Control Environment – System Reliability
  • 32. – Risk-Sensitive Culture • What Actually Happened Kerviel’s Trail – A Media Circus • Criminal trial of 33-year Jerome Kerviel started in Paris’s Palais de Justice. Charges were forgery, abuse of trust, and illegal use of computers. Caused losses to Société Générale's losses and the commencement of the trail, media attention was at a high because Kerviel claimed he was a scapegoat for high-risk trading practices that were condoned by Société Générale when profitable. • Société Générale maintained that Kerviel was a rogue trader who single-handedly developed methods to conduct unauthorized trading without being detected
  • 33. and used them to take massive trading positions that ultimately backfired when markets turned against him. • Global financial markets were slow recovering from the 2008 crisis, but memories of Société Générale trading losses remined vivid because at the time of its announcement in 2008 the incident seemed to confirm investors' worst fears that banks in general were taking massive amounts of risk far beyond their traditional lines of business. Société Générale – The Rise of Trading • Société Générale, 1999 through 2006, had a net income increase of 164 percent from €2 billion annually to €5.2 billion. Its retail and investment management businesses both prospered during this
  • 34. period, with the main drivers of this higher profitability was its Corporate and Investment Banking (CIB) division, whose net income increased 230 percent, from €708 million annually to €2.3 billion. • Société Générale was not alone pursing growth in the early 2000s through expansion of its trading and capital markets business. Its larger rival, BNP Paribas, adopted the same strategy, as did other major banks in other countries such as the United Kingdom, Germany, and United States. • With other major, this strategy backfired when their fixed income desks became deeply involved in structuring, selling, and trading credit derivatives and debt securities backed by U.S. residential mortgages and were unable to avoid massive write-downs and funding crises when global credit
  • 35. markets seized up in the second half of 2008. Jerome Kerviel • Kerviels position in Société Générale CIB was unlikely to be noticed because he was one of seven traders in the Delta One Listed Products (DLP) team, a part of the Equity Finance section in the Equity Arbitrage group of the CIB’s Global Equities & Derivative