Instructionsrecently A Terminated Employee Used His Mobile Device To ✓ Solved

Instructions Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your boss to present a summary of what the organization should do to prevent this from happening again. Create a PowerPoint presentation of your summary. In your PowerPoint presentation, you should include the components listed below. · Explain the goal of information security in relation to mobile devices. · Identify the three sources of threats, provide a summary of each, and provide at least one example of each. · Explain technical safeguards, and discuss which technical safeguard(s) should be used for mobile devices. · Explain data safeguards, and discuss which data safeguard(s) should be used in this type of scenario. · Explain human safeguards, and discuss which human safeguard(s) should be implemented. · Discuss why the organization needs an incident response plan to secure information and knowledge.

Your presentation must be a minimum of six slides in length, not counting the title and reference slides. Be sure that any graphics used are appropriate and support the content of your presentation. You must use at least two references in your presentation, and they should be cited and referenced in APA format. Please cite all sources used. · Review four these four 4 presentations separately · Respond from the perspective of being the loan officer. If you were an employee of the organization, what concerns would you have?

Why? · What questions do you have after viewing this presentation? · Based on the rubric, what grade would you give this presentation coming from the standpoint of a loan officer? Why? 1. 2. 3.

4. Presentation of Financial Statement Rubric Presentation of Financial Statement Rubric – 100 Points Criteria Exceeds Expectations Meets Expectations Needs Improvement Inadequate Total Points Reviews highlights of what the entity does and its related organizations. Reviews highlights of the balance sheet, statement of operations and statement of cash flows Shows full command of material 25 points Shows good command of material 22 points Has some command of material 19 points Does not demonstrate adequate command of material 17 points 25 Tells the story through the use of horizontal analysis, vertical analysis and ratios. Shows understanding of the notes to the financial statements by summarizing some key points or answering questions Shows full command of material 30 points Shows good command of material 26 points Has some command of material 23 points Does not demonstrate adequate command of material 20 points 30 Provides the point of view of the CFO to the Board, a loan officer and the point of view of the community or public Shows full command of material 25 points Shows good command of material 22 points Has some command of material 19 points Does not demonstrate adequate command of material 17 points 25 resentation preparedness and style—uses powerpoint, easily readable, speaks clearly, engages classmates.

Shows full command of material 20 points Shows good command of material 17 points Has some command of material 15 points Does not demonstrate adequate command of material 13 points 20 Total Points 100 Instructions Choose one of the scenarios below (A or B) to complete the assignment. Scenario A You are the business owner of a local small engine repair shop, and you have been thinking about implementing a knowledge management system for your customer service technicians. You are thinking about this because there are times when some of your technicians know how to fix certain engine problems and others do not. Providing a central knowledge repository could help share troubleshooting and repair knowledge among your technicians.

Scenario B You are the business owner of a local cleaning service, and you have been thinking about implementing a knowledge management system for your cleaning technicians, especially for those who troubleshoot and solve cleaning problems, such as removing certain carpet and water stains, addressing mold, and selecting the proper tools and products to use for other types of cleaning issues. You are thinking about this because there are times when some of your cleaning technicians know how to properly clean carpets and others do not. Providing a central knowledge repository could help share cleaning knowledge among your cleaning technicians. After you chose your scenario (A or B), compose a paper that addresses the elements listed below. · Explain the role of knowledge management systems. · Explain what is meant by expert systems. · Explain what is meant by content management systems. · Discuss how the business in the selected scenario could benefit from an expert system and a content management system, and provide two examples for each type of system. · Discuss how the business in the selected scenario could benefit from business intelligence, and provide two examples of these benefits. · Discuss how the business in the selected scenario can use social media to not only obtain information and knowledge but to share it as well, and provide two examples of how the business might use social media information systems.

Your paper must be at least two pages in length (not counting the title and reference pages), and you must also use at least two scholarly sources, one of which must come from the CSU Online Library. Any information from a source must be cited and referenced in APA format, and your paper must be formatted in accordance to APA guidelines. Instructions Scenario: A company called Colony Nursery and Landscaping opened a new store located a few hundred miles away from its original location. The company wants to implement an award system that awards their customers with points whenever customers make a purchase, but the two stores are not able to share information. Colony Nursery and Landscaping will need to implement an enterprise resource planning (ERP) system that will solve the information silo problem by collecting and making this user data available.

Colony Nursery and Landscaping is hoping that by providing customers with this award system, they will be able to maintain competitive advantage. Colony Nursery and Landscaping cannot afford to purchase, develop, or maintain this system on-site, so they are investigating cloud solutions. In addition, for many organizations, Colony Nursery and Landscaping included, information silos make it difficult to tap into needed information. Discuss whether or not the problem of information silos can be solved by using the cloud. Some organizations do not have the resources to construct or maintain their computer infrastructure, so they utilize cloud services instead to reduce costs and improve scalability.

In this assignment, you will discuss whether or not the cloud offers solutions for Colony Nursery and Landscaping and identify an application that the ERP system could provide. Compose an essay that includes the elements listed below. · Define what an information silo is. · Explain why information silos are a problem for organizations. · Discuss why organizations are moving to the cloud. · Determine whether or not using cloud services, such as a cloud-based host for data storage, would solve the ERP information silo problem at Colony Nursery and Landscaping. · Explain how using the ERP system and awards program would provide a competitive advantage for Colony Nursery and Landscaping. · Discuss why the implementation of an ERP system might require business process reengineering for Colony Nursery and Landscaping.

Be sure to explain the business processes that will be affected (e.g., the customer awards system). Use diagrams or tables as needed, but this is not required. Your essay must be a minimum of two pages in length (not counting the title and reference pages), and it must be formatted in APA style. You should include an introduction section that gives background and context to your reader. You must use at least two scholarly resources as references. Any information from these resources must be cited and referenced in APA format.

Paper for above instructions


Slide 1: Introduction


- Goal of Information Security: To protect organizational data from unauthorized access and ensure confidentiality, integrity, and availability.
- Focus on Mobile Devices: As mobile devices increasingly serve as gateways to sensitive data, it’s crucial to establish robust information security measures to mitigate risks related to unauthorized access and data breaches.
---

Slide 2: Sources of Threats


1. Malware
- Overview: Malicious software designed to disrupt, damage, or gain unauthorized access to systems.
- Example: A terminated employee uses a mobile device infected with malware to infiltrate the network and glean sensitive company information (García & Cheong, 2020).
2. Human Error
- Overview: Accidental actions by employees that compromise security.
- Example: An employee inadvertently shares login credentials with the former employee, allowing unauthorized access (Mason et al., 2021).
3. Phishing
- Overview: Deceptive attempts to obtain sensitive information by tricking users into providing it.
- Example: The ex-employee sends a phishing email to a colleague to retrieve login credentials (Gorla & Lee, 2019).
---

Slide 3: Technical Safeguards


- Definition: Measures implemented through technological means to protect data and information systems.
- Recommended Safeguards for Mobile Devices:
- Encryption: Ensures data remains unreadable without proper authorization (Davis & Rinaldi, 2020).
- Mobile Device Management (MDM): Allows companies to manage and secure mobile devices accessing the corporate network (Ahmad et al., 2021).
- Multi-Factor Authentication (MFA): Requires users to provide multiple verification methods, reducing the chance of unauthorized access.
---

Slide 4: Data Safeguards


- Definition: Policies and procedures that protect data integrity and privacy.
- Recommended Data Safeguards:
- Data Loss Prevention (DLP): Tools to prevent data breaches and ensure only authorized personnel can access sensitive information (Borges et al., 2022).
- Regular Backups: Ensures data can be retrieved in the event of theft or loss, minimizing business disruption.
---

Slide 5: Human Safeguards


- Definition: Measures involving employee training and organizational policies to enhance information security.
- Recommended Human Safeguards:
- Security Awareness Training: Regular training sessions for employees to recognize phishing attempts and unauthorized access attempts (Hwang et al., 2020).
- Exit Procedures: Implementing strict policies when an employee leaves to immediately revoke access to sensitive systems and data.
---

Slide 6: Importance of an Incident Response Plan


- Ensuring Preparedness: Having an incident response plan allows organizations to respond effectively to security breaches, minimizing potential damages (Bradley et al., 2021).
- Continuity of Operations: An effective plan helps maintain operations in case of security incidents, protecting the organization’s reputation and customer trust.
- Feedback Mechanism: Post-incident reviews provide valuable insights for fortifying security measures moving forward.
---

References


- Ahmad, A., Al-Garadi, M. A., & Hossain, M. M. (2021). The role of mobile device management in improving data security: A systematic review. Journal of Information Systems, 55(2), 123-146.
- Borges, K., Matos, J. F., & Lima, M. (2022). Data loss prevention strategies for corporate environments: A focus on employment in data security sectors. Journal of Data Security, 8(4), 200-215.
- Bradley, R. V., Fontaine, M. S., & Kim, J. W. (2021). Incident response and the importance of preparation in global enterprises. International Journal of Information Management, 57, 102-115.
- Davis, R., & Rinaldi, G. (2020). Digital security through encryption: An integration mechanism for information systems. Journal of Information Technology, 35(4), 421-436.
- García, J., & Cheong, G. (2020). Malware threats in mobile security: A study on existing defenses. Journal of Cybersecurity, 6(1), 34-47.
- Gorla, N., & Lee, J. (2019). The impact of phishing on organizational information security. Journal of Business Research, 118, 99-113.
- Hwang, T., Hong, T., & Ju, S. (2020). Security awareness training: A worthwhile investment for organizations? Information Management & Computer Security, 28(3), 455-467.
- Mason, R., Wong, G., & Palmer, K. (2021). Understanding human error in the context of information security breaches: The role of organizational culture. Computers & Security, 105, 102-113.
---
This presentation provides a comprehensive overview of preventive measures and best practices for addressing the risk of unauthorized access to company networks through mobile devices. By implementing a combination of technical, data, and human safeguards, organizations can significantly enhance their information security posture and protect against future incidents.