100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

D270 RHM3 Task 3 passed - Proposal for new information security protocol At TuxWing Inc. Western Governors University

Rating
-
Sold
-
Pages
11
Uploaded on
20-08-2024
Written in
2024/2025

D270 RHM3 Task 3 passed - Proposal for new information security protocol At TuxWing Inc. Western Governors University

Institution
D270 RHM3
Course
D270 RHM3









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
D270 RHM3
Course
D270 RHM3

Document information

Uploaded on
August 20, 2024
Number of pages
11
Written in
2024/2025
Type
Exam (elaborations)
Contains
Unknown

Content preview

D270 RHM3 Task 3 passed - Proposal for new information security protocol At
TuxWing Inc. Western Governors University

, lOMoARcPSD|6353920




D270 RHM3 Task 3 passed - Proposal for new information security protocol At TuxWing Inc.Western
Governors University




D270 Task 3



Proposal For A New Information Security Protocol At
TuxWing Inc.

Significance of the Problem

Our company, TuxWing Inc., was a recent victim of a ransomware hacking attack.
This attack was costly to the organization both financially and in terms of our
reputation. Based on our initial internal assessment, the attackers were able to
take advantage of multiple human and technological vulnerabilities which can be
summarized as the failure of our current information security policies,
procedures, and protocols that made our business an easy target for cyber
attacks.

There are a multitude of foreseeable problems with having an outdated security
policy beyond just an increased risk of data breaches. Outdated or nonexistent
security policies can make it easier for hackers to gain access to sensitive data,
such as customer information, financial data, and intellectual property. Data
breaches and other types of attacks, when successful, can be costly and
damaging to TuxWing’s reputation.

Another potential problem with having an outdated information security policy
is loss of productivity: Cyber attacks can disrupt a business's operations and lead
to lost productivity (Sweta, M. 2023). For example, if a hacker takes down a
business's website, customers may be unable to make purchases or conduct
business with the company.

An outdated information security protocol can lead to financial losses. This can
occur as a result of a variety of different types of cyber attacks, such as the cost of
repairing damage to computer systems, compensating customers for data
breaches, and paying fines for regulatory violations or even cyber-attackers in
Ransomware attacks where as of 2020 over 50% of all businesses were targeted.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
smartzone Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
3197
Member since
5 year
Number of followers
2291
Documents
14397
Last sold
1 day ago
AMAIZING EDUCATION WORLD

GET ALL KIND OF EXAMS ON THIS PAGE ,COMPLETE TEST BANKS,SUMMARIES,STUDY GUIDES,PROJECT PAPERS,ASSIGNMENTS,CASE STUDIES, YOU CAN ALSO COMMUNICATE WITH THE SELLER FOR ANY PRE-ORDER,ORDER AND ETC.

3.7

584 reviews

5
260
4
93
3
103
2
29
1
99

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions