PowerPoint Assignment – 6 slides of information with Speaker notes Instructions Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As...

1 answer below »


PowerPoint Assignment – 6 slides of information with Speaker notes






Instructions


Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your boss to present a summary of what the organization should do to prevent this from happening again. Create a PowerPoint presentation of your summary. In your PowerPoint presentation, you should include the components listed below.


§ Explain the goal of information security in relation to mobile devices.


§ Identify the three sources of threats, provide a summary of each, and provide at least one example of each.


§ Explain technical safeguards, and discuss which technical safeguard(s) should be used for mobile devices.


§ Explain data safeguards, and discuss which data safeguard(s) should be used in this type of scenario.


§ Explain human safeguards, and discuss which human safeguard(s) should be implemented.


§ Discuss why the organization needs an incident response plan to secure information and knowledge.



Your presentation must be a minimum of six slides in length, not counting the title and reference slides. Be sure that any graphics used are appropriate and support the content of your presentation. You must use at least two references in your presentation, and they should be cited and referenced in APA format. Please cite all sources used.

Answered Same DayMay 01, 2021

Answer To: PowerPoint Assignment – 6 slides of information with Speaker notes Instructions Recently, a...

Anurag answered on May 02 2021
131 Votes
How to Save Our Organization from Cyber Threats?    4
HOW TO SAVE OUR ORGANIZATION FROM CYBER THREATS?
Table of Contents
Introduction    3
The Goal of Cyber Security Regarding Mobile Devices    3
Sources of Cyber Threats    3
Technical Safeguards    5
Data Safeguards    5
Human
Safeguards    6
Importance of Incident Response Plan to Secure Information    6
Conclusion    7
References    8
Introduction
    Recently, an ex-employee of our company, who was terminated few days back, has used his mobile device to log into the company network attempted to steal sensitive information from the company database. Being the manager of the information technology (IT) security department, I have been told by our boss to present a summary of what our organization must do in order to prevent such things from happening again.
The Goal of Cyber Security Regarding Mobile Devices
    IT experts whose organizations do permit by and by possessed cell phones were asked how much development there has been in the quantity of individual gadgets on their corporate organizations (Stephens, 2018). By far most, 91%, have seen an increment in the quantity of cell phones interfacing with corporate organizations in the course of recent years. For most members, the expansion was exceptionally emotional with 72% saying they dramatically increased the quantity of individual portable gadgets in this time span. With the high speed of improvement of mobile devices, particularly close to home smart phones interfacing with corporate organizations, clearly the amount of security scenes is similarly expected to create. Among all IT specialists, around 66% (64%) expected to see an extension in the amount of convenient security scenes.
Sources of Cyber Threats
    There are numerous normal cyber attacking strategies, including denial of-services (DoS) or distributed denial-of-services (DDoS) assaults, phishing attacks, and malware attacks (Gupta & Dahiya, 2021).
     DoS attacks are among the most un-requesting to appreciate. They work on the rule of making some device so clamoring that it can't play out its work. Any orchestrated contraption has a particular level of cutoff that it's prepared to use when related. The restriction of each device depends upon parts like the processor, the proportion of memory, the proportion of frameworks organization upholds, the processor of the association interface card (if it has one), and the association affiliation speed. A powerful DoS attack happens when a device's ability to perform is baffled or hindered.
    Perhaps the most self-evident and well-known strategies for attacking has existed for many years is the phishing attack (Rothrock, 2018). While phishing attack is not that...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here