100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Resumen

Summary Assignment 2 CIS 560.docx Assignment 2: The Cost of Inadequate Controls CIS560: Security Access and Control Strategies Data breaches are a preventable part of security management. What is important to realize is that while they can still occur with q

Puntuación
-
Vendido
-
Páginas
6
Subido en
10-01-2021
Escrito en
2020/2021

Assignment 2 CIS Assignment 2: The Cost of Inadequate Controls CIS560: Security Access and Control Strategies Data breaches are a preventable part of security management. What is important to realize is that while they can still occur with quality controls, the real measure is how fast these breaches can be resolved. In the IT industry, speed involves the availability of resources and point of discovery. Adding the necessary items and routers despite the budget cut is critical to the infrastructure and will drive future recovery results. We want the recovery results to drive in the right direction. With a small budget, the LOTR experience should make every effort to develop the network. We learned with the initial analysis that the LOTR experience shares their network across a few departments. There is a lack of controlled access protocols. This creates two issues: there is an easier way for hac

Mostrar más Leer menos
Institución
Grado









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
10 de enero de 2021
Número de páginas
6
Escrito en
2020/2021
Tipo
Resumen

Temas

Vista previa del contenido

Irias \1
Running head: The Cost of Inadequate Controls




Assignment 2: The Cost of Inadequate Controls



CIS560: Security Access and Control Strategies




Data breaches are a preventable part of security management. What is important to

realize is that while they can still occur with quality controls, the real measure is how fast these

, Irias2
The Cost of Inadequate Controls
breaches can be resolved. In the IT industry, speed involves the availability of resources and

point of discovery. Adding the necessary items and routers despite the budget cut is critical to the

infrastructure and will drive future recovery results. We want the recovery results to drive in the

right direction. With a small budget, the LOTR experience should make every effort to develop

the network.

We learned with the initial analysis that the LOTR experience shares their network across

a few departments. There is a lack of controlled access protocols. This creates two issues: there is

an easier way for hackers to reach a higher volume of accounts. Because of this, there is an

inability to track users and transactions from an audit standpoint. There is over privilege in the

system, and without proper training the employees can probe around the network without

consequence. Without monitoring the probing that occurs, we are not taking into account the

amount of entry points we have for breaches.

Annual Loss of Revenue

When it comes to cost of data breaches, there is more to it than just cost to repair. “Over

the past few years, privacy incidents have been announced frequently enough to question

whether organizations have the necessary incentives to safeguard consumer information.”

(Acquisti, Friedman, &Telang 2006) Organizations must consider the impact of the market value

of the company as these incidents are announced. The way in which they are announced also

must be taken into account.

There is payback associated in two different categories for data breaches. Sales, revenue,

and profitability are all impacted but also stock value. “In the case of Choicepoint, after

involuntary allowing criminals to access over 163,000 consumer credit reports, the company was

forced to pay a $15 million in penalties…” (Acquisti et. Al 2006) Choicepoint’s revenue that
$7.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
helperatsof1 Wgu
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2523
Miembro desde
5 año
Número de seguidores
2045
Documentos
7896
Última venta
1 semana hace
Best class tutorials

Well written guides to enhance your learning potential

4.0

439 reseñas

5
224
4
88
3
56
2
30
1
41

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes