Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4.2 TrustPilot
logo-home
Resume

Summary Assignment 2 CIS 560.docx Assignment 2: The Cost of Inadequate Controls CIS560: Security Access and Control Strategies Data breaches are a preventable part of security management. What is important to realize is that while they can still occur with q

Note
-
Vendu
-
Pages
6
Publié le
10-01-2021
Écrit en
2020/2021

Assignment 2 CIS Assignment 2: The Cost of Inadequate Controls CIS560: Security Access and Control Strategies Data breaches are a preventable part of security management. What is important to realize is that while they can still occur with quality controls, the real measure is how fast these breaches can be resolved. In the IT industry, speed involves the availability of resources and point of discovery. Adding the necessary items and routers despite the budget cut is critical to the infrastructure and will drive future recovery results. We want the recovery results to drive in the right direction. With a small budget, the LOTR experience should make every effort to develop the network. We learned with the initial analysis that the LOTR experience shares their network across a few departments. There is a lack of controlled access protocols. This creates two issues: there is an easier way for hac

Montrer plus Lire moins
Établissement
Cours









Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

École, étude et sujet

Établissement
Cours

Infos sur le Document

Publié le
10 janvier 2021
Nombre de pages
6
Écrit en
2020/2021
Type
Resume

Sujets

Aperçu du contenu

Irias \1
Running head: The Cost of Inadequate Controls




Assignment 2: The Cost of Inadequate Controls



CIS560: Security Access and Control Strategies




Data breaches are a preventable part of security management. What is important to

realize is that while they can still occur with quality controls, the real measure is how fast these

, Irias2
The Cost of Inadequate Controls
breaches can be resolved. In the IT industry, speed involves the availability of resources and

point of discovery. Adding the necessary items and routers despite the budget cut is critical to the

infrastructure and will drive future recovery results. We want the recovery results to drive in the

right direction. With a small budget, the LOTR experience should make every effort to develop

the network.

We learned with the initial analysis that the LOTR experience shares their network across

a few departments. There is a lack of controlled access protocols. This creates two issues: there is

an easier way for hackers to reach a higher volume of accounts. Because of this, there is an

inability to track users and transactions from an audit standpoint. There is over privilege in the

system, and without proper training the employees can probe around the network without

consequence. Without monitoring the probing that occurs, we are not taking into account the

amount of entry points we have for breaches.

Annual Loss of Revenue

When it comes to cost of data breaches, there is more to it than just cost to repair. “Over

the past few years, privacy incidents have been announced frequently enough to question

whether organizations have the necessary incentives to safeguard consumer information.”

(Acquisti, Friedman, &Telang 2006) Organizations must consider the impact of the market value

of the company as these incidents are announced. The way in which they are announced also

must be taken into account.

There is payback associated in two different categories for data breaches. Sales, revenue,

and profitability are all impacted but also stock value. “In the case of Choicepoint, after

involuntary allowing criminals to access over 163,000 consumer credit reports, the company was

forced to pay a $15 million in penalties…” (Acquisti et. Al 2006) Choicepoint’s revenue that
€6,55
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Faites connaissance avec le vendeur

Seller avatar
Les scores de réputation sont basés sur le nombre de documents qu'un vendeur a vendus contre paiement ainsi que sur les avis qu'il a reçu pour ces documents. Il y a trois niveaux: Bronze, Argent et Or. Plus la réputation est bonne, plus vous pouvez faire confiance sur la qualité du travail des vendeurs.
helperatsof1 Wgu
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
2523
Membre depuis
5 année
Nombre de followers
2045
Documents
7896
Dernière vente
1 semaine de cela
Best class tutorials

Well written guides to enhance your learning potential

4,0

439 revues

5
224
4
88
3
56
2
30
1
41

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions