SlideShare a Scribd company logo
You have just been hired as an information security engineer for a large, multi-international
corporation. Unfortunately, your company has suffered multiple security breaches that have
threatened customers' trust in the fact that their confidential data and financial assets are private
and secured. Credit card information was compromised by an attack that infiltrated the network
through a vulnerable wireless connection within the organization. The other breach was an inside
job where personal data was stolen because of weak access control policies within the
organization that allowed an unauthorized individual access to valuable data. Your job is to
develop a risk management policy that addresses the two security breaches and how to mitigate
these risks.
Solution
Risk management is a structured approach to administering uncertainty and consist of actions
obtain to identify, assess, monitor, and reduce the impact of risks to your big business. Risks are
events, conditions or circumstances which lead to negative consequences for your business. A
good risk management plan with appropriate risk management strategies can minimize costly
and stressful problems, and may also decrease insurance claims and premiums. Efficient risk
management starts with the recognizing, by every person in the organization, that the effort is
main, and that everyone is supposed to uphold that effort. So far the organization has had its
security breached on a number of occasions. According to this trouble, the organization has
situated a high level of importance on physical and password security and anti-virus and anti-
spyware security. It has also make a decision to use 2 layers of firewalls to prevent hackers from
getting in. The organization will also use the IDSs and Virtual Private Networks. These steps
with the help of employees and staff should help prevent unauthorized intrusions from both
internal and external intruders that will take sensitive information from our clients. Management
has the ultimate responsibility to manage risks. Control includes making decisions considering
which risks are acceptable and how to address those that are not. Those decisions can be made
only with the participation of the entire workforce, since each of us understands the risks of his
or her own tasks improved than anyone else in the organization.

More Related Content

Similar to You have just been hired as an information security engineer for a l.pdf

Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015sarah kabirat
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Enterprise Insider
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
Accounting_Whitepapers
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
cyberprosocial
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
PC Doctors NET
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
wbesse
 
Small Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdfSmall Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdf
elizabethrdusek
 
Small Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptxSmall Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptx
elizabethrdusek
 
Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven Security
EMC
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Accenture Technology
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
cyberprosocial
 
The Role of Incident Response in Cybersecurity: Protecting Your Organization
The Role of Incident Response in Cybersecurity: Protecting Your OrganizationThe Role of Incident Response in Cybersecurity: Protecting Your Organization
The Role of Incident Response in Cybersecurity: Protecting Your Organization
LDMGlobal
 
Safeguarding Insurance Companies with Advanced Cybersecurity Solutions A Comp...
Safeguarding Insurance Companies with Advanced Cybersecurity Solutions A Comp...Safeguarding Insurance Companies with Advanced Cybersecurity Solutions A Comp...
Safeguarding Insurance Companies with Advanced Cybersecurity Solutions A Comp...
AeoLogic Technologies
 
Navigating The Benefits of Firewall Managed Services.docx
Navigating The Benefits of Firewall Managed Services.docxNavigating The Benefits of Firewall Managed Services.docx
Navigating The Benefits of Firewall Managed Services.docx
TheWalkerGroup1
 
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdfHow Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
Enterprise Insider
 
Cyber Security Services for Business.pdf
Cyber Security Services for Business.pdfCyber Security Services for Business.pdf
Cyber Security Services for Business.pdf
Vograce
 
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsTo Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
Elizabeth Dimit
 
Cyber Security Audit.pdf
Cyber Security Audit.pdfCyber Security Audit.pdf
Cyber Security Audit.pdf
Vograce
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
BernardinoMelgar1
 

Similar to You have just been hired as an information security engineer for a l.pdf (20)

Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
Small Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdfSmall Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdf
 
Small Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptxSmall Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptx
 
Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven Security
 
MP_OneSheet_VulnThreat
MP_OneSheet_VulnThreatMP_OneSheet_VulnThreat
MP_OneSheet_VulnThreat
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
 
The Role of Incident Response in Cybersecurity: Protecting Your Organization
The Role of Incident Response in Cybersecurity: Protecting Your OrganizationThe Role of Incident Response in Cybersecurity: Protecting Your Organization
The Role of Incident Response in Cybersecurity: Protecting Your Organization
 
Safeguarding Insurance Companies with Advanced Cybersecurity Solutions A Comp...
Safeguarding Insurance Companies with Advanced Cybersecurity Solutions A Comp...Safeguarding Insurance Companies with Advanced Cybersecurity Solutions A Comp...
Safeguarding Insurance Companies with Advanced Cybersecurity Solutions A Comp...
 
Navigating The Benefits of Firewall Managed Services.docx
Navigating The Benefits of Firewall Managed Services.docxNavigating The Benefits of Firewall Managed Services.docx
Navigating The Benefits of Firewall Managed Services.docx
 
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdfHow Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
 
Cyber Security Services for Business.pdf
Cyber Security Services for Business.pdfCyber Security Services for Business.pdf
Cyber Security Services for Business.pdf
 
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsTo Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
 
Cyber Security Audit.pdf
Cyber Security Audit.pdfCyber Security Audit.pdf
Cyber Security Audit.pdf
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 

More from feelingspaldi

Write an essay consists of 5 paragraphs (comparing between a city and.pdf
Write an essay consists of 5 paragraphs (comparing between a city and.pdfWrite an essay consists of 5 paragraphs (comparing between a city and.pdf
Write an essay consists of 5 paragraphs (comparing between a city and.pdf
feelingspaldi
 
Why is Antitrust activity so harmful to consumers and the economy W.pdf
Why is Antitrust activity so harmful to consumers and the economy W.pdfWhy is Antitrust activity so harmful to consumers and the economy W.pdf
Why is Antitrust activity so harmful to consumers and the economy W.pdf
feelingspaldi
 
Why should Emperor Conrad lead the crusades Use bible verse.Sol.pdf
Why should Emperor Conrad lead the crusades Use bible verse.Sol.pdfWhy should Emperor Conrad lead the crusades Use bible verse.Sol.pdf
Why should Emperor Conrad lead the crusades Use bible verse.Sol.pdf
feelingspaldi
 
WHICH PERSON WOULD GENERLLY BE TREATED AS A MATERIAL PARTICIPANT IN .pdf
WHICH PERSON WOULD GENERLLY BE TREATED AS A MATERIAL PARTICIPANT IN .pdfWHICH PERSON WOULD GENERLLY BE TREATED AS A MATERIAL PARTICIPANT IN .pdf
WHICH PERSON WOULD GENERLLY BE TREATED AS A MATERIAL PARTICIPANT IN .pdf
feelingspaldi
 
Which of the following are widely recognized disadvantages to the Eur.pdf
Which of the following are widely recognized disadvantages to the Eur.pdfWhich of the following are widely recognized disadvantages to the Eur.pdf
Which of the following are widely recognized disadvantages to the Eur.pdf
feelingspaldi
 
What is the function of a rhizoid Describe asexual and sexual repro.pdf
What is the function of a rhizoid  Describe asexual and sexual repro.pdfWhat is the function of a rhizoid  Describe asexual and sexual repro.pdf
What is the function of a rhizoid Describe asexual and sexual repro.pdf
feelingspaldi
 
We define a relation on set of Whole NumbersW={0,1,2,3…} As follow.pdf
We define a relation on set of Whole NumbersW={0,1,2,3…} As follow.pdfWe define a relation on set of Whole NumbersW={0,1,2,3…} As follow.pdf
We define a relation on set of Whole NumbersW={0,1,2,3…} As follow.pdf
feelingspaldi
 
What does the cutting-plane line represent List and explain seven d.pdf
What does the cutting-plane line represent  List and explain seven d.pdfWhat does the cutting-plane line represent  List and explain seven d.pdf
What does the cutting-plane line represent List and explain seven d.pdf
feelingspaldi
 
True or False The employment relationship that is typical of modern.pdf
True or False The employment relationship that is typical of modern.pdfTrue or False The employment relationship that is typical of modern.pdf
True or False The employment relationship that is typical of modern.pdf
feelingspaldi
 
The following monthly data are taken from Ramirez Company at July 31.pdf
The following monthly data are taken from Ramirez Company at July 31.pdfThe following monthly data are taken from Ramirez Company at July 31.pdf
The following monthly data are taken from Ramirez Company at July 31.pdf
feelingspaldi
 
State the reasons for the current drought in South Africa. Describe .pdf
State the reasons for the current drought in South Africa. Describe .pdfState the reasons for the current drought in South Africa. Describe .pdf
State the reasons for the current drought in South Africa. Describe .pdf
feelingspaldi
 
Select the true statements concerning seeds.A Seeds allow for dor.pdf
Select the true statements concerning seeds.A Seeds allow for dor.pdfSelect the true statements concerning seeds.A Seeds allow for dor.pdf
Select the true statements concerning seeds.A Seeds allow for dor.pdf
feelingspaldi
 
Russian dude. Formulated the ____ hypothesis regarding prebioisSo.pdf
Russian dude. Formulated the ____ hypothesis regarding prebioisSo.pdfRussian dude. Formulated the ____ hypothesis regarding prebioisSo.pdf
Russian dude. Formulated the ____ hypothesis regarding prebioisSo.pdf
feelingspaldi
 
Robin Hartshorne• a biography of the mathematician• a descriptio.pdf
Robin Hartshorne• a biography of the mathematician• a descriptio.pdfRobin Hartshorne• a biography of the mathematician• a descriptio.pdf
Robin Hartshorne• a biography of the mathematician• a descriptio.pdf
feelingspaldi
 
Question 7 Write the expression in expanded form. 81n x + In y O4 Inx.pdf
Question 7 Write the expression in expanded form. 81n x + In y O4 Inx.pdfQuestion 7 Write the expression in expanded form. 81n x + In y O4 Inx.pdf
Question 7 Write the expression in expanded form. 81n x + In y O4 Inx.pdf
feelingspaldi
 
Position of birds eating sunflower seed is the niche dimension we.pdf
Position of birds eating sunflower seed is the niche dimension we.pdfPosition of birds eating sunflower seed is the niche dimension we.pdf
Position of birds eating sunflower seed is the niche dimension we.pdf
feelingspaldi
 
Physical Security Plan1.Identify the role of environmental control.pdf
Physical Security Plan1.Identify the role of environmental control.pdfPhysical Security Plan1.Identify the role of environmental control.pdf
Physical Security Plan1.Identify the role of environmental control.pdf
feelingspaldi
 
Part I. True or False Place a T or an F, whichever you consider cor.pdf
Part I. True or False Place a T or an F, whichever you consider cor.pdfPart I. True or False Place a T or an F, whichever you consider cor.pdf
Part I. True or False Place a T or an F, whichever you consider cor.pdf
feelingspaldi
 
Module 03 Discussion - Musics Impact on Baby Boomers.pdf
Module 03 Discussion - Musics Impact on Baby Boomers.pdfModule 03 Discussion - Musics Impact on Baby Boomers.pdf
Module 03 Discussion - Musics Impact on Baby Boomers.pdf
feelingspaldi
 
Lynn files a suit against Karl. Karl denies Lynns charges and sets.pdf
Lynn files a suit against Karl. Karl denies Lynns charges and sets.pdfLynn files a suit against Karl. Karl denies Lynns charges and sets.pdf
Lynn files a suit against Karl. Karl denies Lynns charges and sets.pdf
feelingspaldi
 

More from feelingspaldi (20)

Write an essay consists of 5 paragraphs (comparing between a city and.pdf
Write an essay consists of 5 paragraphs (comparing between a city and.pdfWrite an essay consists of 5 paragraphs (comparing between a city and.pdf
Write an essay consists of 5 paragraphs (comparing between a city and.pdf
 
Why is Antitrust activity so harmful to consumers and the economy W.pdf
Why is Antitrust activity so harmful to consumers and the economy W.pdfWhy is Antitrust activity so harmful to consumers and the economy W.pdf
Why is Antitrust activity so harmful to consumers and the economy W.pdf
 
Why should Emperor Conrad lead the crusades Use bible verse.Sol.pdf
Why should Emperor Conrad lead the crusades Use bible verse.Sol.pdfWhy should Emperor Conrad lead the crusades Use bible verse.Sol.pdf
Why should Emperor Conrad lead the crusades Use bible verse.Sol.pdf
 
WHICH PERSON WOULD GENERLLY BE TREATED AS A MATERIAL PARTICIPANT IN .pdf
WHICH PERSON WOULD GENERLLY BE TREATED AS A MATERIAL PARTICIPANT IN .pdfWHICH PERSON WOULD GENERLLY BE TREATED AS A MATERIAL PARTICIPANT IN .pdf
WHICH PERSON WOULD GENERLLY BE TREATED AS A MATERIAL PARTICIPANT IN .pdf
 
Which of the following are widely recognized disadvantages to the Eur.pdf
Which of the following are widely recognized disadvantages to the Eur.pdfWhich of the following are widely recognized disadvantages to the Eur.pdf
Which of the following are widely recognized disadvantages to the Eur.pdf
 
What is the function of a rhizoid Describe asexual and sexual repro.pdf
What is the function of a rhizoid  Describe asexual and sexual repro.pdfWhat is the function of a rhizoid  Describe asexual and sexual repro.pdf
What is the function of a rhizoid Describe asexual and sexual repro.pdf
 
We define a relation on set of Whole NumbersW={0,1,2,3…} As follow.pdf
We define a relation on set of Whole NumbersW={0,1,2,3…} As follow.pdfWe define a relation on set of Whole NumbersW={0,1,2,3…} As follow.pdf
We define a relation on set of Whole NumbersW={0,1,2,3…} As follow.pdf
 
What does the cutting-plane line represent List and explain seven d.pdf
What does the cutting-plane line represent  List and explain seven d.pdfWhat does the cutting-plane line represent  List and explain seven d.pdf
What does the cutting-plane line represent List and explain seven d.pdf
 
True or False The employment relationship that is typical of modern.pdf
True or False The employment relationship that is typical of modern.pdfTrue or False The employment relationship that is typical of modern.pdf
True or False The employment relationship that is typical of modern.pdf
 
The following monthly data are taken from Ramirez Company at July 31.pdf
The following monthly data are taken from Ramirez Company at July 31.pdfThe following monthly data are taken from Ramirez Company at July 31.pdf
The following monthly data are taken from Ramirez Company at July 31.pdf
 
State the reasons for the current drought in South Africa. Describe .pdf
State the reasons for the current drought in South Africa. Describe .pdfState the reasons for the current drought in South Africa. Describe .pdf
State the reasons for the current drought in South Africa. Describe .pdf
 
Select the true statements concerning seeds.A Seeds allow for dor.pdf
Select the true statements concerning seeds.A Seeds allow for dor.pdfSelect the true statements concerning seeds.A Seeds allow for dor.pdf
Select the true statements concerning seeds.A Seeds allow for dor.pdf
 
Russian dude. Formulated the ____ hypothesis regarding prebioisSo.pdf
Russian dude. Formulated the ____ hypothesis regarding prebioisSo.pdfRussian dude. Formulated the ____ hypothesis regarding prebioisSo.pdf
Russian dude. Formulated the ____ hypothesis regarding prebioisSo.pdf
 
Robin Hartshorne• a biography of the mathematician• a descriptio.pdf
Robin Hartshorne• a biography of the mathematician• a descriptio.pdfRobin Hartshorne• a biography of the mathematician• a descriptio.pdf
Robin Hartshorne• a biography of the mathematician• a descriptio.pdf
 
Question 7 Write the expression in expanded form. 81n x + In y O4 Inx.pdf
Question 7 Write the expression in expanded form. 81n x + In y O4 Inx.pdfQuestion 7 Write the expression in expanded form. 81n x + In y O4 Inx.pdf
Question 7 Write the expression in expanded form. 81n x + In y O4 Inx.pdf
 
Position of birds eating sunflower seed is the niche dimension we.pdf
Position of birds eating sunflower seed is the niche dimension we.pdfPosition of birds eating sunflower seed is the niche dimension we.pdf
Position of birds eating sunflower seed is the niche dimension we.pdf
 
Physical Security Plan1.Identify the role of environmental control.pdf
Physical Security Plan1.Identify the role of environmental control.pdfPhysical Security Plan1.Identify the role of environmental control.pdf
Physical Security Plan1.Identify the role of environmental control.pdf
 
Part I. True or False Place a T or an F, whichever you consider cor.pdf
Part I. True or False Place a T or an F, whichever you consider cor.pdfPart I. True or False Place a T or an F, whichever you consider cor.pdf
Part I. True or False Place a T or an F, whichever you consider cor.pdf
 
Module 03 Discussion - Musics Impact on Baby Boomers.pdf
Module 03 Discussion - Musics Impact on Baby Boomers.pdfModule 03 Discussion - Musics Impact on Baby Boomers.pdf
Module 03 Discussion - Musics Impact on Baby Boomers.pdf
 
Lynn files a suit against Karl. Karl denies Lynns charges and sets.pdf
Lynn files a suit against Karl. Karl denies Lynns charges and sets.pdfLynn files a suit against Karl. Karl denies Lynns charges and sets.pdf
Lynn files a suit against Karl. Karl denies Lynns charges and sets.pdf
 

Recently uploaded

Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 

Recently uploaded (20)

Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 

You have just been hired as an information security engineer for a l.pdf

  • 1. You have just been hired as an information security engineer for a large, multi-international corporation. Unfortunately, your company has suffered multiple security breaches that have threatened customers' trust in the fact that their confidential data and financial assets are private and secured. Credit card information was compromised by an attack that infiltrated the network through a vulnerable wireless connection within the organization. The other breach was an inside job where personal data was stolen because of weak access control policies within the organization that allowed an unauthorized individual access to valuable data. Your job is to develop a risk management policy that addresses the two security breaches and how to mitigate these risks. Solution Risk management is a structured approach to administering uncertainty and consist of actions obtain to identify, assess, monitor, and reduce the impact of risks to your big business. Risks are events, conditions or circumstances which lead to negative consequences for your business. A good risk management plan with appropriate risk management strategies can minimize costly and stressful problems, and may also decrease insurance claims and premiums. Efficient risk management starts with the recognizing, by every person in the organization, that the effort is main, and that everyone is supposed to uphold that effort. So far the organization has had its security breached on a number of occasions. According to this trouble, the organization has situated a high level of importance on physical and password security and anti-virus and anti- spyware security. It has also make a decision to use 2 layers of firewalls to prevent hackers from getting in. The organization will also use the IDSs and Virtual Private Networks. These steps with the help of employees and staff should help prevent unauthorized intrusions from both internal and external intruders that will take sensitive information from our clients. Management has the ultimate responsibility to manage risks. Control includes making decisions considering which risks are acceptable and how to address those that are not. Those decisions can be made only with the participation of the entire workforce, since each of us understands the risks of his or her own tasks improved than anyone else in the organization.