Question

By doing a search of the Internet or by other research methods, find an example of...

By doing a search of the Internet or by other research methods, find an example of an organization that faced an information systems security issue or crisis.

1) How did the organization identify that there was a security problem?

2) What, if any, security infrastructure and policies were in place when the problem occurred?

3) What initial actions were taken to deal with the situation?

4) From a management perspective, what, if any, new organizational policies and procedures did they institute?

5) Were any new security tools and technologies eventually implemented to further safeguard their systems?

6) What was the business impact? How did they recover? Were there any legal ramifications, loss of customers, or damage of reputation?

7) Generally speaking, how can a business determine the value of investing in security and control?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer:

1) organization identify that there was a security problem:

A vulnerability is a weak spot in your network that might be exploited by a security threat. Risks are the potential consequences and impacts of unaddressed vulnerabilities. In other words, failing to do Windows Updates on your Web server is vulnerability. Some of the risks associated with that vulnerability include loss of data, hours or days of site downtime and the staff time needed to rebuild a server after it’s been compromised.

Before you start searching around for weak spots in your network, we suggest you first review our Where and How to Find Vulnerabilities tool.

The issue we have is that we have the public accessing the Internet on a network that needs to be secured due to the nature of some of the county businesses. We don't know that we've had any security breaches, but the potential is there. So the manager of our county IS Department has requested that our public computers be moved off of the county network.

*As per the HomeworkLib policy give you answer, for other, post separately

*Hope this is helpful to you, thank you & rate.

Add a comment
Know the answer?
Add Answer to:
By doing a search of the Internet or by other research methods, find an example of...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Find AN EXAMPLE of an organization that faced an information systems security issue or crisis. 1)...

    Find AN EXAMPLE of an organization that faced an information systems security issue or crisis. 1) How did the organization identify that there was a security problem? 2) What, if any, security infrastructure and policies were in place when the problem occurred? 3) What initial actions were taken to deal with the situation? 4) From a management perspective, what, if any, new organizational policies and procedures did they institute? 5) Were any new security tools and technologies eventually implemented to...

  • There are many examples of how computer systems are vulnerable due to failure, destruction, errors, and...

    There are many examples of how computer systems are vulnerable due to failure, destruction, errors, and abuse. By doing a search of the Internet or by other research methods, find an example of an organization that faced an information systems security issue or crisis. Ponder these questions: (these questions serve as a guide; try to answer as many as you can & remember to post references) 1) How did the organization identify that there was a security problem? 2) What,...

  • Building Information Systems & Organizational Change By doing a search of the Internet, or by other...

    Building Information Systems & Organizational Change By doing a search of the Internet, or by other research methods, find an example of an organization that introduced new technology and systems in order to effectuate changes in business processes, enhancements, and productivity gains (remember to post references). Ponder these questions (answer as many questions as you can): (1) What set of business problems was the organization trying to address? (2) What solution did the organization choose to implement? Was it developed...

  • CASE 14: BREACHING THE SECURITY OF AN INTERNET PATIENT PORTAL Major theme: IT security Background Information...

    CASE 14: BREACHING THE SECURITY OF AN INTERNET PATIENT PORTAL Major theme: IT security Background Information Kaiser Permanente is an integrated health delivery system that serves over eight million members in nine states and the District of Columbia. 1 In the late 1990s, Kaiser Permanente introduced an Internet patient portal, Kaiser Permanente Online (also known as KP Online). Members can use KP Online to request appointments, request prescription refills, obtain health care service information, seek clinical advice, and participate in...

  • Management Information System

    through studying the IT infrastructure of a relevant information system (IS)/ information technology (IT) used by selecting any organization of your choice locally or internationally The idea is to investigate the selected organization using the main components of IT (Hardware, software, services, data management and networking). Infrastructure Investigation, which is in a selected industry, should be carried out by using articles, websites, books and journal papers and /or interviews. In the report, you are expected to discuss:Executive Summary .     ...

  • Managing Global Systems topic highlights the many challenges faced by enterprises as they attempt to manage their globally dispersed information systems. The growth of international trade has ushered...

    Managing Global Systems topic highlights the many challenges faced by enterprises as they attempt to manage their globally dispersed information systems. The growth of international trade has ushered in many new business models for corporations seeking to compete in these markets. For instance, a Volkswagen car that is built in Germany may have an engine assembled in Hungary and a transmission assembled in Japan. We are entering into an age of complex business interdependencies that span across a global scale....

  • Note: Plagiarism is strictly prohibited, Please do not copy from internet, Choose a company and write...

    Note: Plagiarism is strictly prohibited, Please do not copy from internet, Choose a company and write about the below format. Strategic Management Analysis Prompt Required Your paper should include the following Core Elements: Introduction - In this brief section you will introduce your organization. Include the name of the organization, its location, and a simple overview of the organization. About the Organization - In this section you will discuss the organization including: History - How did the organization start? What...

  • Search the internet and find an instance of "Earnings Mismanagement" and "Fraud" in your pathway. In...

    Search the internet and find an instance of "Earnings Mismanagement" and "Fraud" in your pathway. In a minimum of 3 paragraphs, tell us: The company name (in the subject line of your post). Why this company interests you. When they did it. Describe in detail what they did and how they got caught. Tell us what the consequences were to the individuals responsible. Cite at least two sources for your information. Examples of businesses in pathways could be: AHCD: Dance,...

  • Part 1: Please describe one example of information technology that you use for your role in...

    Part 1: Please describe one example of information technology that you use for your role in your organization. Your description should include the business functions that are supported by the technology, the technology infrastructure (platform) on which it operates, and the types of data that are captured or produced by the system. Next describe the benefits provided by the system. Does it automate manual processes, to reduce the labor costs required for the process? Does it support business decisions to...

  • true and false questions: In addition to the members of the information system department, end users...

    true and false questions: In addition to the members of the information system department, end users are considered the members of the organization using the information system. * True False A business model describes how a company produces, delivers, and sells a product or service to create wealth. * True False Digital Dashboards display, on a single screen, graphs and charts of Key Performance Indicators for managing a company by high level managers. * True False An information system is...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT