Create a formal document to the ceo of the company

Assignment Help Management Information Sys
Reference no: EM131404370

You work as a security administrator of a large department store chain or choose another large corporation of your choosing. You believe that there has been a breach in the VPN where an employee has stolen data using a personal laptop along with using the company assignment computer.

You review the logs from the IDS, remote access systems, and, file servers and confirm this belief. Your employer wishes to gain access to the personal laptop used for the breach to determine the full extent of the data stolen. The guilty employee's lawyer claims that the laptop is not identifiable.

Create a formal document to the CEO of the company to account for your findings, tools used to solve the breach and what steps will be taken to prevent this type of breach from happening again. You will also need to create a press release to the Public regarding this breach. Create a disaster recovery plan for the employees and vendors in case of a breach.

Things to consider: What would best be used to identify the specific laptop used for the theft? How would you acquire the identifying information? List some items that would NOT be useful to identify the specific computer used by the insider.

Reference no: EM131404370

Questions Cloud

Difference between a standard deviation and a standard error : What is the difference between a probability distribution and a sampling distribution?- What is the difference between a standard deviation and a standard error?
What is the probability that the alarm will shut off : It's the middle of the night and a burglar has just broken into the storage warehouse and set off the alarm. What is the probability that the alarm will shut off before the next police patrol car drives by?
Decide how your organization should house its backups : Your organization has approximately 10TB of data, and you need to decide if your organization should have on-site or offsite tape storage.Your organization must be able to easily recover data no older than one month, as an operational requirement.Yo..
Complete the federal income tax forms for a married couple : Complete the federal income tax forms for a married couple (information provided in Appendix A). It is up to the student which forms are used from the given list.
Create a formal document to the ceo of the company : You work as a security administrator of a large department store chain or choose another large corporation of your choosing. You believe that there has been a breach in the VPN where an employee has stolen data using a personal laptop along with u..
What is the optimal hedge ratio for a three-month contract : What is the optimal hedge ratio for a three-month contract? What does it mean?
Discuss the disease and its effects on the human body : Please pay attention to the marking rubric and ensure your essay covers all areas. Case Study - Leigh Richards. We are looking for you to demonstrate that you understand the disease and its effects on the human body
How is mobile driving the app revolution : This assignment should investigate where the future of apps are going. With apps beginning to surface on our TV's (Apple TV), our cars (Car Play), etc, will apps take over traditional software? How are operating systems like Windows 10 becoming ..
What is the purpose of the fasb codification system : What is the purpose of the FASB Codification System? What are the nine content areas located in the FASB Codification System? What types of items are located under each content area?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Determine a significant trend that having impact on hit

Determine a significant trend that you believe is having the most significant impact on the expansion of HIT -  Argue that a health organization's shift to HMIS ensures the effectiveness of health care services. Provide support for your rationale.

  What are main advantages of using a network-based approach

What are the main advantages of using a network-based approach to project management rather than a Gantt chart? Under what circumstances might a Gantt chart be preferable to a network-based approach?

  Prepare report identifying causes of failure to a erp system

You have been asked to prepare a report identifying the causes of failure and recommendations to adopt a new ERP system.

  What do you feel are the most desirable rdbmss

In reviewing current help wanted advertising in the papers, online, word of mouth, and other sources, what do you feel are the most desirable RDBMSs to have experience with for a career as a DBA or database developer and what skill sets are requir..

  Conduct a vulnerability

You are hired to conduct a vulnerability, threat, and security assessment on a web application and submit your clear recommendation for corrective actions based on your assessment.

  Compute bill brays piece rate for product

Compute Bill Brays piece rate for product on the lathe and compute his pay for the period - characteristics of robots and provide three (3) conditions in manufacturing best suited to the application of robotics.

  How has technology changed the role of retail managers

Write a 750- to 1,000-word paper in which you explore how technology has improved the effectiveness and efficiency of retail management. How has technology changed the role of retail managers

  Method of evaluating a product or service

Compare and contrast crowdsourcing and user studies as a method of evaluating a product or service. Which method is more effective, and why

  How it ties to the it strategic or tactical plans

Review the supplemental reading material linked above. Pick one of the concepts discussed in the documents and explain it in your own words. Include an example of that concept that explains it in real-world terms. Provide how it applies in toda..

  Why new technology often disruptive for existing it systems

Why is new technology often disruptive for existing IT systems? What things can be done to prepare these systems for future technology ahead of time

  Which of the following statements is true regarding treating

Which of the following statements is true regarding treating risks?After you've addressed a risk, it is important to appoint someone to make certain that the risk treatment is being regularly applied so that if a security incident arises, that pers..

  Predicting kilowatt usage- economicsinformation systemthe

predicting kilowatt usage- economicsinformation systemthe company has determined kilowatt-hours used for last year and

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd