Reduce the risk the threat occurring

Assignment Help Basic Computer Science
Reference no: EM133985094

Question

Insider threats describe security threats to an organisation coming from people working inside the organisation. As the CISO (Chief Information Security Officer) of an organisation, you are aware that insider threats are an increasing exposure for all organisations.

For each of these insider threats listed below:

a) identify controls that could reduce the risk the threat occurring (prevention);

b) identify controls that would assist with the detection of these threats, should they occur.

The solutions can use some technology, but the human factor is also important in addressing these issues. The solutions shouldn't prevent the normal work of the organisation from occurring.

1. An IT systems administrator uses their privileged access to insert some additional (ghost) staff members on the payroll system and then collects the pay of these ghost staff members;

2. A member of a University student administration area with access privileges to update grades in the student records system has been taking bribes from students to modify their grades for important units. Note that the normal workflow involves grade modifications being recommended by academics in charge of the relevant unit, the grade changes being approved by various processes, then entered into the student records system by a staff member in the student administration area.

Reference no: EM133985094

Questions Cloud

What is General Data Protection Regulation : What is the General Data Protection Regulation (GDPR)? Who implemented the GDPR?
How do the new testament writer see this fulfilled in church : How do the New Testament writers see this fulfilled in the church? What are the implications for the mission of the church?
Health care centre suffers from low information securities : A health care centre suffers from very low information security in terms of maturity across many elements of infosec and information assurance,
Where is the theological principle discovered : Where is the theological principle discovered in this New Testament narrative found elsewhere in the Scriptures?
Reduce the risk the threat occurring : Identify controls that could reduce the risk the threat occurring. identify controls that would assist with the detection of these threats,
Reflect on a community workers professional views : SAP304 Social Research Methods, Acknowledge Education - exploring the experiences of a classmate who can reflect on a community worker's professional views
How do new testament writers see this fulfilled in church : How do the New Testament writers see this fulfilled in the church? What are the implications for the mission of the church?
Future security risk environment and landscape : In what three broad ways is the future security risk environment and landscape likely to significantly change in the next 2-4 years?
How it presents the relationship between sin and forgiveness : Pick a part of one of this readings and analyze how it presents the relationship between sin and forgiveness.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd