Why employees should never answer any questions

Assignment Help Management Information Sys
Reference no: EM132209394

Question:

You work for a medium-sized IT firm and your boss mentions that recently a number of employees have received calls from individuals who didn't identify themselves and asked a lot of questions about the company and its computer infrastructure.

At first, he thought this was just a computer software vendor who was trying to sell your company some new product, but no vendor has approached the company.

He also says several strange e-mails requesting personal information have been sent to employees. There have also been outsiders searching your company's trash dumpsters for recyclable containers.

Your boss asks what you think about all of these strange incidents. Respond and be sure to provide recommendations on what should be done to secure your company's private and personal data - both electronically and in terms of what data may be going in the dumpster.

Include a detailed response on why employees should never answer any questions about their company's computer infrastructure to nonauthorized individuals.

Please write 500 words with 0 % plagiarism and in APA format.

Reference no: EM132209394

Questions Cloud

Define schedules of reinforcement : From the lecture material, 4 schedules of reinforcement are presented. Give 1 example of each schedule from your own life. Be specific enough.
How should rww go about notifying its peers : When would be the appropriate time to begin the forensic data collection process to analyze the root cause of this incident? Why?
Does self-disclosure of therapist improve eating disorder : PSY 510 My topic you picked was, "does self-disclosure of the therapist improve eating disorder treatment." My hypothesis would be that self-disclosure.
Explain how the organization started in the it industry : Evaluate the impact the technology organization you chose has had on business and/or business operations.
Why employees should never answer any questions : Your boss asks what you think about all of these strange incidents. Respond and be sure to provide recommendations on what should be done to secure.
Explain the triple constraint of project management : Briefly explain in your own words the relationship between each element of the triple constraint of project management.
Discuss two types of databases that would be useful : Identify and evaluate at least three considerations that one must plan for when designing a database.
Discuss about the effectiveness of classic models : Compare and contrast the effectiveness of classic models and recently evolved models such as Big Data and NoSQL.
Comment on your perspective of elon musks behavior : Comment on your perspective of Elon Musk's behavior and if you feel that it is positively or negatively influencing Tesla.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Identify four types of teams

Identify four (4) types of teams. What are their characteristics? As a group, which of the teams do you mostly identify with and why?

  Describe the need for internet filtering and identify

What steps would you take to reduce the risks to an organisation's information security?

  Create a gantt chart illustrating the project tasks

Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task.3. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program).

  What special challenges does biometric authentication pose

How is biometric authentication more secure compared to other authentication methods like text passwords, tokens, smartcards, etc.? What special challenges does biometric authentication pose

  How information systems become so important

In this discussion let us discuss more on how IS has its evolution in e-business and cloud computing.

  Non-technical and technical staff relationshow can a

non-technical and technical staff relationshow can a technology manager help to foster good working relationships

  Describe in detail how you would harden the target

Pick a high profile target in the area where you live or an area that you are familiar with and describe in detail how you would harden the target.

  Which domains of the it infrastructure were involved

In the past year, Company M experienced 22 information security incidents, most of which involved lost or stolen laptops, tablet PCs, and smartphones.

  Identify the three key aspects of a team

Identify the three (3) key aspects of a team. What are their characteristics? As a group, which of the teams do you mostly identify with and why?

  What type of encryption would you recommend and why

Would you use a VPN to establish a remote connection with the hypothetical company you are working for? Why or why not?

  Discuss the ideas and practices from the agile at work

Reflect and discuss how your team worked together through the assignments and activities during this class.

  Personal key performance indicators

Explain how you will overcome threats from each of the five forces while achieving your professional goal(s) after graduation from the MS-IST Program.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd