What steps must employees take before leaving

Assignment Help Management Information Sys
Reference no: EM13842756

Discussion Question:

Imagine you're a senior executive for a large company. You've just been put in charge of your companies Information Security (IS) Program and told that your mandate is to prevent cybercrime through developing sound policy. Your primary challenges are twofold: 1) You are a transnational company and employees travel all over the globe; and 2) Your company has no active audit program in place to quantify vulnerabilities and potential losses from attacks to information systems. Attack them one at a time...

Realizing that when employees travel they are exposed to risk and possible cyberattack... You need to put information security protocols in place for individuals traveling abroad; specifically what other steps will you put in place to ensure that information (and equipment) will be secure? Will your plan vary depending on the countries your employees visit or is it one security plan works for all countries visited? Why? What steps must employees take before leaving and how will you measure that those steps have been taken?

Your other immediate challenge is to discuss with management the challenges associated with quantifying vulnerabilities and potential losses from attacks to your company's computer systems. What's involved in doing that and what are some of the biggest challenges involved in accomplishing that kind of assessment?

Reference no: EM13842756

Questions Cloud

Differences between cobit and the iso : In 500 words or less, explain the most important differences between COBIT and the ISO 27000 series in relation to information security
What did the new england colonies produce? : What did the New England Colonies produce?
Population experiences exponential growth : A bacterial population experiences exponential growth during a 4-day period. Assume that 200 colonies were present at the beginning of the 1st day, but by the beginning of the 3rd day, the population had grown to 335.
Describe and justify benefits through a real-world : Describe and justify its benefits through a real-world example e.g. healthcare, online shopping, public transportation, national security/anti-terrorism, etc.
What steps must employees take before leaving : Imagine you're a senior executive for a large company. You've just been put in charge of your companies Information Security (IS) Program and told that your mandate is to prevent cybercrime through developing sound policy. What steps must employee..
Determine the x value : 1) Determine the x value in logx128 = 7/12. 2) Expand the expression using log properties: In 3√x - y2/3z
What was the fund turnover : A mutual fund sold $36 million of assets during the year and purchased $32 million in assets. If the average daily assets of the fund were $96 million, what was the fund turnover?
Following demonstrates proper subject-verb agreement? : following demonstrates proper subject-verb agreement?
How much could you withdraw at end of each of twenty years : Suppose you inherited $630,000 and invested it at 8.25% per year. How much could you withdraw at the end of each of the next 20 years?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Stopping a failed technologyhow would you know when to fail

stopping a failed technologyhow would you know when to fail fast in stopping a failed technology investment versus

  Information systems networks1 how have networks contributed

information systems networks1. how have networks contributed to the digital divide?2. if you had your own retail

  Improve its profits and reduce price of its good or service

If a company employees technology to reduce its costs, improve its profits, and reduce the price of its good or service, how exactly is that a problem, Kris

  Different approches1 what are the differences between the

different approches1. what are the differences between the human-centered and user-centered approaches? do you agree

  The ipacs project- when it hits the fan

Read the case The IPACS Project: When IT Hits the Fan. As you read the case think about it three-sphere model terms. After reading through the case, please create a post containing the following: Three problems that occurred during the project

  Activity normal crash and event

Activity Normal Crash and Event - CPM: Network diagram - The subsequent data have been collected for a certain project

  Implementing a physical and environmental security program

Identify three steps required for implementing a physical and environmental security program

  What are some likely future uses and enhancements

What are some likely future uses and enhancements

  The importance of security awareness training

Find an online article (or resource) regarding the importance of security awareness training.

  Collaborative and individual writing processes

Collaborative and Individual Writing Processes and disadvantages of the collaborative writing process in 200 to 300 words. In what situations might an individual writing process be preferable?

  Explain why is it surprising that money markets exist

Money market environment - Explain Why is it surprising that money markets exist? Why do they exist nonetheless? What factors explain the relative size of money markets in different countries?

  You work as the senior network engineer for a medium size

you work as the senior network engineer for a medium size organization. the company has offices in miami and los

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd