100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary Assignment 2 CIS 560.docx Assignment 2: The Cost of Inadequate Controls CIS560: Security Access and Control Strategies Data breaches are a preventable part of security management. What is important to realize is that while they can still occur with q

Rating
-
Sold
-
Pages
6
Uploaded on
10-01-2021
Written in
2020/2021

Assignment 2 CIS Assignment 2: The Cost of Inadequate Controls CIS560: Security Access and Control Strategies Data breaches are a preventable part of security management. What is important to realize is that while they can still occur with quality controls, the real measure is how fast these breaches can be resolved. In the IT industry, speed involves the availability of resources and point of discovery. Adding the necessary items and routers despite the budget cut is critical to the infrastructure and will drive future recovery results. We want the recovery results to drive in the right direction. With a small budget, the LOTR experience should make every effort to develop the network. We learned with the initial analysis that the LOTR experience shares their network across a few departments. There is a lack of controlled access protocols. This creates two issues: there is an easier way for hac

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Course

Document information

Uploaded on
January 10, 2021
Number of pages
6
Written in
2020/2021
Type
Summary

Subjects

Content preview

Irias \1
Running head: The Cost of Inadequate Controls




Assignment 2: The Cost of Inadequate Controls



CIS560: Security Access and Control Strategies




Data breaches are a preventable part of security management. What is important to

realize is that while they can still occur with quality controls, the real measure is how fast these

, Irias2
The Cost of Inadequate Controls
breaches can be resolved. In the IT industry, speed involves the availability of resources and

point of discovery. Adding the necessary items and routers despite the budget cut is critical to the

infrastructure and will drive future recovery results. We want the recovery results to drive in the

right direction. With a small budget, the LOTR experience should make every effort to develop

the network.

We learned with the initial analysis that the LOTR experience shares their network across

a few departments. There is a lack of controlled access protocols. This creates two issues: there is

an easier way for hackers to reach a higher volume of accounts. Because of this, there is an

inability to track users and transactions from an audit standpoint. There is over privilege in the

system, and without proper training the employees can probe around the network without

consequence. Without monitoring the probing that occurs, we are not taking into account the

amount of entry points we have for breaches.

Annual Loss of Revenue

When it comes to cost of data breaches, there is more to it than just cost to repair. “Over

the past few years, privacy incidents have been announced frequently enough to question

whether organizations have the necessary incentives to safeguard consumer information.”

(Acquisti, Friedman, &Telang 2006) Organizations must consider the impact of the market value

of the company as these incidents are announced. The way in which they are announced also

must be taken into account.

There is payback associated in two different categories for data breaches. Sales, revenue,

and profitability are all impacted but also stock value. “In the case of Choicepoint, after

involuntary allowing criminals to access over 163,000 consumer credit reports, the company was

forced to pay a $15 million in penalties…” (Acquisti et. Al 2006) Choicepoint’s revenue that

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
helperatsof1 Wgu
Follow You need to be logged in order to follow users or courses
Sold
2523
Member since
5 year
Number of followers
2045
Documents
7896
Last sold
1 week ago
Best class tutorials

Well written guides to enhance your learning potential

4.0

439 reviews

5
224
4
88
3
56
2
30
1
41

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions