Information technology security

Assignment Help Management Information Sys
Reference no: EM13849565

You work as a security administrator of a large department store chain or choose another large corporation of your choosing. You believe that there has been a breach in the VPN where an employee has stolen data using a personal laptop along with using the company assignment computer. You review the logs from the IDS, remote access systems, and, file servers and confirm this belief. Your employer wishes to gain access to the personal laptop used for the breach to determine the full extent of the data stolen. The guilty employee's lawyer claims that the laptop is not identifiable.

Create a formal document to the CEO of the company to account for your findings, tools used to solve the breach and what steps will be taken to prevent this type of breach from happening again. You will also need to create a press release to the Public regarding this breach.

Create a disaster recovery plan for the employees and vendors in case of a breach.

Things to consider: What would best be used to identify the specific laptop used for the theft? How would you acquire the identifying information? List some items that would NOT be useful to identify the specific computer used by the insider.

Post your press release to the discussion board so that your classmates can ask questions (they are your news reporters). You should respond to your classmates as appropriate.

All documents will be turned as a part of the Final Project

Reference no: EM13849565

Questions Cloud

Examine the various alternatives available : Examine the various alternatives available and compare their functionality, cost, features, and type of protection. Perform an analysis and describe which one you think is better and why. Create a weighted ranking to your own evaluation of the fea..
Develop bulleted plan of action in a powerpoint presentation : Important aspect of managing any food service department or operation is problem-solving - Watch the interview (transcript) with the Food & Beverage expert regarding Best Practices in Kitchen Design.
What charges against gus and al : Read Articles 221 on burglary and 223 on theft together with appropriate text and answer the following. Mike is a homeless man who is also an alcoholic and a crack addict. He lives under a bridge in the City. He has fashioned a tarp to cover himse..
Value creation in a global : In this Assignment, you will evaluate how economics, government, and law affect value creation in a global context based on your experiences working for your intern/externship employer. From a visionary leadership perspective, you will formulate a..
Information technology security : Information Technology Security
The database design proposal assignment : The Database Design Proposal assignment
Information security awareness training : Information Security Awareness Training
Problem solving in your community : Problem Solving in Your Community- Write a 2 page paper. Address the following in your paper: Explain a problem in your community and how you might solve this problem if you were a police officer
Analyze the practice of dumping dangerous drugs overseas : Follow the link below, read the article and analyze the practice of "dumping" dangerous drugs overseas. Can an American company be penalized for marketing a product deemed unsafe by the U.S., if it is not also banned by the foreign government

Reviews

Write a Review

Management Information Sys Questions & Answers

  What it recommendations would you make for john

Important information about IT Recommendations - What IT recommendations would you make for John?

  Manufacturing and service-based organization

Explain a real-life example of how departments work interdependently in both a manufacturing and service-based organization.

  Explain the hot technologies and related issues

Hot Technologies - Explain the hot technologies and related issues?

  Demand for police services

The college is located in Stephenville, Texas, a small town about 30 miles southwest of the Dallas/Forth Worth metroplex. During the summer months, the student population is around 5,000. This number swells to 20,000 during fall and spring semesters...

  Comment on open source softwarehow is microsoft and other

comment on open source softwarehow is microsoft and other software manufacturers combating the threat of open source

  Monitor the productivity and communications of employees

Employers often want to find out if their workers are productive and loyal. Determine at least one (1) limit that you would place upon a private employer's rights to monitor the productivity and communications of employees at work. Support your re..

  Write paper on android fragmentation-burden or benefit

Write paper on Android Fragmentation: Burden or Benefit

  Project for banking account system

Project for banking account system-Map your most refined use case from Project 1 to its sequence diagram

  Social media application edmodo

About social media application Edmodo, What are its major features? How are people using these applications

  Javascripthow do i design an algorithm to find the largest

javascripthow do i design an algorithm to find the largest number in a list of them?design an algorithm that finds the

  Explain java program to print personal details

Explain Java Program to Print Personal Details - Purpose a program that displays information about bank account information. This program should print out your full name, address, city, state and zip code.

  Supporting mobile health clinics

Analyze Case Study : Supporting Mobile Health Clinics: The Children's Health Fund of New York City and Examine the case study, and develop the conclusions, recommendations, and implications.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd