SlideShare a Scribd company logo
1 of 2
Chapter 11 – Network Security
The president of NDAS has just read a newspaper article explaining that the top security threats
to companies aren’t always from hackers trying to break in through the corporate firewall. In
many cases, companies are more concerned about things such as internal employees and social
engineering. After reading this article, he rushed down to Les Coone’s office to understand
what
could happen to NDAS. Les has turned to you to prepare an analysis of NDAS security.
While Les was in your office you mention that a security issue you recently learned about needs
to be addressed. Five employees in the Accounts Payable office were recently given two weeks
notice of their impending layoff due to the outsourcing of some of the Accounts Payable
functions
to another company. As you understand it, those five employees aren’t happy with being
released.
Exercises
1. Prepare a report outlining the major security threats faced by NDAS. Be sure to identify those
that you think are major threats and those that are minor threats.
2. Prepare a partial risk assessment for NDAS that includes their major assets, threats, and
controls. You will need to make some reasonable assumptions.
3. Develop a set of security controls, for use in the NDAS main office and for its Web site,
designed to control risks due to disruption, destruction, and disaster and unauthorized access.
4. Think about the accounts payable employees that are being laid off. What should be done to
ensure that they don’t do anything (such as steal customer data files, etc) before they leave
the
company. With their access to so much accounting data and other network access, list some of
the main concerns that you may have. In addition, what will you suggest to mitigate these risks?
Solution
1) The major security threats faced by NDAS are :
The minor threats may be exposing the information regarding transactions, customer information
and inventory. Mostly thee internal threats are minor.
2) The partial risk assessment for NDAS includes the following steps:
Consider the dispersed nature of NDAS operations i.e the NDAS offices spread across 16 cities
in the country, so focus on all of it. Firstly focus on the major threats that are caused.
3) The set of security protocols to control risks due to disruption, destruction and disaster are as
follows:
The set of protocols for unauthorised access are:
The staff should respond immediately to identify the intruder and to take appropriate action to
control threat.
4)

More Related Content

Similar to Chapter 11 Network Security The president of NDAS has just read a new.docx

Five Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementFive Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementAnton Chuvakin
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedTiffany Graham
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Securityinside-BigData.com
 
Course Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information SystemCourse Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information SystemTheodore Le
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?CBIZ, Inc.
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2Mike Revell
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxjjvdneut
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxjjvdneut
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?SOCVault
 
case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)ishan parikh production
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackMekhi Da ‘Quay Daniels
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
Anticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistAnticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistMorrison & Foerster
 
You are the information technology senior analyst at your Private Eq.docx
You are the information technology senior analyst at your Private Eq.docxYou are the information technology senior analyst at your Private Eq.docx
You are the information technology senior analyst at your Private Eq.docxjacvzpline
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic SecurityChad Korosec
 

Similar to Chapter 11 Network Security The president of NDAS has just read a new.docx (20)

Five Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementFive Mistakes of Vulnerability Management
Five Mistakes of Vulnerability Management
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
Course Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information SystemCourse Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information System
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
 
case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
CISO-Fundamentals
CISO-FundamentalsCISO-Fundamentals
CISO-Fundamentals
 
Anticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistAnticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach Checklist
 
You are the information technology senior analyst at your Private Eq.docx
You are the information technology senior analyst at your Private Eq.docxYou are the information technology senior analyst at your Private Eq.docx
You are the information technology senior analyst at your Private Eq.docx
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic Security
 

More from tienlivick

The long-term liability section of Twin Digital Corporation's balance.docx
The long-term liability section of Twin Digital Corporation's balance.docxThe long-term liability section of Twin Digital Corporation's balance.docx
The long-term liability section of Twin Digital Corporation's balance.docxtienlivick
 
The length of time- in minutes- for an airplane to obtain clearance fo.docx
The length of time- in minutes- for an airplane to obtain clearance fo.docxThe length of time- in minutes- for an airplane to obtain clearance fo.docx
The length of time- in minutes- for an airplane to obtain clearance fo.docxtienlivick
 
The Kansas Early Learning Standards for Social and Emotional Developme.docx
The Kansas Early Learning Standards for Social and Emotional Developme.docxThe Kansas Early Learning Standards for Social and Emotional Developme.docx
The Kansas Early Learning Standards for Social and Emotional Developme.docxtienlivick
 
The Italian economy can be characterized by the following information-.docx
The Italian economy can be characterized by the following information-.docxThe Italian economy can be characterized by the following information-.docx
The Italian economy can be characterized by the following information-.docxtienlivick
 
The individual that reports to the respective discipline manager- and.docx
The individual that reports to the respective discipline manager- and.docxThe individual that reports to the respective discipline manager- and.docx
The individual that reports to the respective discipline manager- and.docxtienlivick
 
The Implementation The unique requirement for the SpecializedList is t.docx
The Implementation The unique requirement for the SpecializedList is t.docxThe Implementation The unique requirement for the SpecializedList is t.docx
The Implementation The unique requirement for the SpecializedList is t.docxtienlivick
 
The imount liay ned to put aiay loday a f (Riound 13 en nemest cent).docx
The imount liay ned to put aiay loday a f (Riound 13 en nemest cent).docxThe imount liay ned to put aiay loday a f (Riound 13 en nemest cent).docx
The imount liay ned to put aiay loday a f (Riound 13 en nemest cent).docxtienlivick
 
The hepcidin hormone acts as a negative regulator of iron absorption-.docx
The hepcidin hormone acts as a negative regulator of iron absorption-.docxThe hepcidin hormone acts as a negative regulator of iron absorption-.docx
The hepcidin hormone acts as a negative regulator of iron absorption-.docxtienlivick
 
The Hardy-Weinberg principleapplies to which populations- Populations.docx
The Hardy-Weinberg principleapplies to which populations- Populations.docxThe Hardy-Weinberg principleapplies to which populations- Populations.docx
The Hardy-Weinberg principleapplies to which populations- Populations.docxtienlivick
 
The Giant Kelp forests of the US Pacific coast have really cold water-.docx
The Giant Kelp forests of the US Pacific coast have really cold water-.docxThe Giant Kelp forests of the US Pacific coast have really cold water-.docx
The Giant Kelp forests of the US Pacific coast have really cold water-.docxtienlivick
 
The function T(n) satisfies T(n)-2T(3n)+O(n2)- Which of the following.docx
The function T(n) satisfies T(n)-2T(3n)+O(n2)- Which of the following.docxThe function T(n) satisfies T(n)-2T(3n)+O(n2)- Which of the following.docx
The function T(n) satisfies T(n)-2T(3n)+O(n2)- Which of the following.docxtienlivick
 
The following table summarizes the ages of a sample of 57 adults that.docx
The following table summarizes the ages of a sample of 57 adults that.docxThe following table summarizes the ages of a sample of 57 adults that.docx
The following table summarizes the ages of a sample of 57 adults that.docxtienlivick
 
The following table presents output per hour in the country of Mistani.docx
The following table presents output per hour in the country of Mistani.docxThe following table presents output per hour in the country of Mistani.docx
The following table presents output per hour in the country of Mistani.docxtienlivick
 
The following selected transactions occurred during 2024 and 2025 for.docx
The following selected transactions occurred during 2024 and 2025 for.docxThe following selected transactions occurred during 2024 and 2025 for.docx
The following selected transactions occurred during 2024 and 2025 for.docxtienlivick
 
The following refer to the following data set- What is the mean (x) of.docx
The following refer to the following data set- What is the mean (x) of.docxThe following refer to the following data set- What is the mean (x) of.docx
The following refer to the following data set- What is the mean (x) of.docxtienlivick
 
The following questions are based on the case study- The Human Right t.docx
The following questions are based on the case study- The Human Right t.docxThe following questions are based on the case study- The Human Right t.docx
The following questions are based on the case study- The Human Right t.docxtienlivick
 
The following items are taken from the financial statements of Pharoah.docx
The following items are taken from the financial statements of Pharoah.docxThe following items are taken from the financial statements of Pharoah.docx
The following items are taken from the financial statements of Pharoah.docxtienlivick
 
The following financial assets appeared in a recent balance sheet of A.docx
The following financial assets appeared in a recent balance sheet of A.docxThe following financial assets appeared in a recent balance sheet of A.docx
The following financial assets appeared in a recent balance sheet of A.docxtienlivick
 
The following graph shows an aggregate demand (AD) curve and a short-r.docx
The following graph shows an aggregate demand (AD) curve and a short-r.docxThe following graph shows an aggregate demand (AD) curve and a short-r.docx
The following graph shows an aggregate demand (AD) curve and a short-r.docxtienlivick
 
The first production department of Stone Incorporated reports the foll.docx
The first production department of Stone Incorporated reports the foll.docxThe first production department of Stone Incorporated reports the foll.docx
The first production department of Stone Incorporated reports the foll.docxtienlivick
 

More from tienlivick (20)

The long-term liability section of Twin Digital Corporation's balance.docx
The long-term liability section of Twin Digital Corporation's balance.docxThe long-term liability section of Twin Digital Corporation's balance.docx
The long-term liability section of Twin Digital Corporation's balance.docx
 
The length of time- in minutes- for an airplane to obtain clearance fo.docx
The length of time- in minutes- for an airplane to obtain clearance fo.docxThe length of time- in minutes- for an airplane to obtain clearance fo.docx
The length of time- in minutes- for an airplane to obtain clearance fo.docx
 
The Kansas Early Learning Standards for Social and Emotional Developme.docx
The Kansas Early Learning Standards for Social and Emotional Developme.docxThe Kansas Early Learning Standards for Social and Emotional Developme.docx
The Kansas Early Learning Standards for Social and Emotional Developme.docx
 
The Italian economy can be characterized by the following information-.docx
The Italian economy can be characterized by the following information-.docxThe Italian economy can be characterized by the following information-.docx
The Italian economy can be characterized by the following information-.docx
 
The individual that reports to the respective discipline manager- and.docx
The individual that reports to the respective discipline manager- and.docxThe individual that reports to the respective discipline manager- and.docx
The individual that reports to the respective discipline manager- and.docx
 
The Implementation The unique requirement for the SpecializedList is t.docx
The Implementation The unique requirement for the SpecializedList is t.docxThe Implementation The unique requirement for the SpecializedList is t.docx
The Implementation The unique requirement for the SpecializedList is t.docx
 
The imount liay ned to put aiay loday a f (Riound 13 en nemest cent).docx
The imount liay ned to put aiay loday a f (Riound 13 en nemest cent).docxThe imount liay ned to put aiay loday a f (Riound 13 en nemest cent).docx
The imount liay ned to put aiay loday a f (Riound 13 en nemest cent).docx
 
The hepcidin hormone acts as a negative regulator of iron absorption-.docx
The hepcidin hormone acts as a negative regulator of iron absorption-.docxThe hepcidin hormone acts as a negative regulator of iron absorption-.docx
The hepcidin hormone acts as a negative regulator of iron absorption-.docx
 
The Hardy-Weinberg principleapplies to which populations- Populations.docx
The Hardy-Weinberg principleapplies to which populations- Populations.docxThe Hardy-Weinberg principleapplies to which populations- Populations.docx
The Hardy-Weinberg principleapplies to which populations- Populations.docx
 
The Giant Kelp forests of the US Pacific coast have really cold water-.docx
The Giant Kelp forests of the US Pacific coast have really cold water-.docxThe Giant Kelp forests of the US Pacific coast have really cold water-.docx
The Giant Kelp forests of the US Pacific coast have really cold water-.docx
 
The function T(n) satisfies T(n)-2T(3n)+O(n2)- Which of the following.docx
The function T(n) satisfies T(n)-2T(3n)+O(n2)- Which of the following.docxThe function T(n) satisfies T(n)-2T(3n)+O(n2)- Which of the following.docx
The function T(n) satisfies T(n)-2T(3n)+O(n2)- Which of the following.docx
 
The following table summarizes the ages of a sample of 57 adults that.docx
The following table summarizes the ages of a sample of 57 adults that.docxThe following table summarizes the ages of a sample of 57 adults that.docx
The following table summarizes the ages of a sample of 57 adults that.docx
 
The following table presents output per hour in the country of Mistani.docx
The following table presents output per hour in the country of Mistani.docxThe following table presents output per hour in the country of Mistani.docx
The following table presents output per hour in the country of Mistani.docx
 
The following selected transactions occurred during 2024 and 2025 for.docx
The following selected transactions occurred during 2024 and 2025 for.docxThe following selected transactions occurred during 2024 and 2025 for.docx
The following selected transactions occurred during 2024 and 2025 for.docx
 
The following refer to the following data set- What is the mean (x) of.docx
The following refer to the following data set- What is the mean (x) of.docxThe following refer to the following data set- What is the mean (x) of.docx
The following refer to the following data set- What is the mean (x) of.docx
 
The following questions are based on the case study- The Human Right t.docx
The following questions are based on the case study- The Human Right t.docxThe following questions are based on the case study- The Human Right t.docx
The following questions are based on the case study- The Human Right t.docx
 
The following items are taken from the financial statements of Pharoah.docx
The following items are taken from the financial statements of Pharoah.docxThe following items are taken from the financial statements of Pharoah.docx
The following items are taken from the financial statements of Pharoah.docx
 
The following financial assets appeared in a recent balance sheet of A.docx
The following financial assets appeared in a recent balance sheet of A.docxThe following financial assets appeared in a recent balance sheet of A.docx
The following financial assets appeared in a recent balance sheet of A.docx
 
The following graph shows an aggregate demand (AD) curve and a short-r.docx
The following graph shows an aggregate demand (AD) curve and a short-r.docxThe following graph shows an aggregate demand (AD) curve and a short-r.docx
The following graph shows an aggregate demand (AD) curve and a short-r.docx
 
The first production department of Stone Incorporated reports the foll.docx
The first production department of Stone Incorporated reports the foll.docxThe first production department of Stone Incorporated reports the foll.docx
The first production department of Stone Incorporated reports the foll.docx
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 

Recently uploaded (20)

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

Chapter 11 Network Security The president of NDAS has just read a new.docx

  • 1. Chapter 11 – Network Security The president of NDAS has just read a newspaper article explaining that the top security threats to companies aren’t always from hackers trying to break in through the corporate firewall. In many cases, companies are more concerned about things such as internal employees and social engineering. After reading this article, he rushed down to Les Coone’s office to understand what could happen to NDAS. Les has turned to you to prepare an analysis of NDAS security. While Les was in your office you mention that a security issue you recently learned about needs to be addressed. Five employees in the Accounts Payable office were recently given two weeks notice of their impending layoff due to the outsourcing of some of the Accounts Payable functions to another company. As you understand it, those five employees aren’t happy with being released. Exercises 1. Prepare a report outlining the major security threats faced by NDAS. Be sure to identify those that you think are major threats and those that are minor threats. 2. Prepare a partial risk assessment for NDAS that includes their major assets, threats, and controls. You will need to make some reasonable assumptions. 3. Develop a set of security controls, for use in the NDAS main office and for its Web site, designed to control risks due to disruption, destruction, and disaster and unauthorized access. 4. Think about the accounts payable employees that are being laid off. What should be done to ensure that they don’t do anything (such as steal customer data files, etc) before they leave the company. With their access to so much accounting data and other network access, list some of the main concerns that you may have. In addition, what will you suggest to mitigate these risks? Solution 1) The major security threats faced by NDAS are : The minor threats may be exposing the information regarding transactions, customer information and inventory. Mostly thee internal threats are minor. 2) The partial risk assessment for NDAS includes the following steps:
  • 2. Consider the dispersed nature of NDAS operations i.e the NDAS offices spread across 16 cities in the country, so focus on all of it. Firstly focus on the major threats that are caused. 3) The set of security protocols to control risks due to disruption, destruction and disaster are as follows: The set of protocols for unauthorised access are: The staff should respond immediately to identify the intruder and to take appropriate action to control threat. 4)