Roles of organizations in protecting systems


Assignment:

Introduction

We have talked about what an information system is and why a company might develop one. In future units, we will discuss topics related to the process of developing, deploying, and managing these systems. In this unit, we will cover information security specifically.

I am sure you are aware of the risks of unsecured information. Identities can be stolen along with assets. Organizations that don't sufficiently protect their systems can lose everything. Information security cannot be an afterthought. This unit will provide an overview of information security and the roles of individuals and organizations in protecting systems and data.

Instructions

Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your boss to present a summary of what the organization should do to prevent this from happening again. Create a PowerPoint presentation of your summary. In your PowerPoint presentation, you should include the components listed below.

  • Explain the goal of information security in relation to mobile devices.
  • Identify the three sources of threats, provide a summary of each, and provide at least one example of each.
  • Explain technical safeguards, and discuss which technical safeguard(s) should be used for mobile devices.
  • Explain data safeguards, and discuss which data safeguard(s) should be used in this type of scenario.
  • Explain human safeguards, and discuss which human safeguard(s) should be implemented.
  • Discuss why the organization needs an incident response plan to secure information and knowledge.

Your presentation must be a minimum of six slides in length, not counting the title and reference slides. Be sure that any graphics used are appropriate and support the content of your presentation. You must use at least two references in your presentation, and they should be cited and referenced in APA format. Please cite all sources used.

Attachment:- Information Systems Security.rar

Solution Preview :

Prepared by a verified Expert
Business Law and Ethics: Roles of organizations in protecting systems
Reference No:- TGS02987563

Now Priced at $30 (50% Discount)

Recommended (91%)

Rated (4.3/5)