Very friendly writer and support team. The writer followed all instructions and finished before the deadline. clear and well thought out.
Case Study #2: Data Security & Data Loss Prevention
Congratulations on successfully completing your first briefing paper for Padgett-Beale! The management interns did so well that the Training Team has asked for your assistance in developing a second training module. The topic for this training module will be Ã¢â‚¬Å“Data Security and Data Loss Prevention for Travelers.Ã¢â‚¬Â
This training topic was selected after two Padgett-Beale employees had sensitive corporate information and login credentials stolen from their mobile devices while they were traveling. One employee was traveling inside the United States. The other employee was out of the office for two weeks on a multi-country trip. In one case, it appears that the attackers gained access to both a company cellphone and a company-owned laptop. In the other, it appears that the active attack affected an employeeÃ¢â‚¬â„¢s personal laptop while she was using hotel provided Wi-Fi. This employee was using her personal laptop because her company laptop was in checked baggage (due to FAA and TSA restrictions) and was stolen while in the airlineÃ¢â‚¬â„¢s baggage handling system.
Fortunately, neither person had stored or accessed customer information from these devices. Both thefts were caught after attackers tried to exploit the stolen login credentials and could not get past the two-factor authentication requirement (security code generated an authenticator application on the employeeÃ¢â‚¬â„¢s corporate cell phone). During the
after action reviews
for these incidents, a training gap and a technology gap were identified. A policy gap, with respect to enforcing
separation of duties
was also identified as a potential area of risk (too much access to sensitive data while traveling could exacerbate the risks of data loss).
Your deliverable for this assignment will be a briefing paper that identifies and discusses five or more major issues that employees need to be aware of about this topic (Data Security and Data Loss Prevention for Travelers). After you identify and describe each security or privacy issue, include two to three additional points that employees should know. Try to keep a neutral tone, that is, you should focus on solutions not blame. You should also address the importance of protecting both personal and company owned devices and data while traveling. After you address the issues, identify and discuss at least 5 recommended solutions (include at least one technology solution and one policy solution). See the instructions below for additional information about length, formatting, and citing of sources.
1. Review the Week 1, 2, and 3 readings.
2. Read these articles about security tips for business travel (both US and foreign travel).
3. Research how a data loss prevention solution can help prevent data thefts. Begin with these resources:
4. Research how two-factor authentication solutions can be used to prevent data thefts by attackers who have stolen a personÃ¢â‚¬â„¢s login credentials. Begin with these resources:
5. Include in your discussion 3 or more additional technologies that could be implemented to help prevent data thefts originating from a business travelerÃ¢â‚¬â„¢s mobile devices.
a. Virtual Private Network
b. Whole Disk Encryption
c. Mobile Device Management (including remote wipe for stolen devices)
Write a 2 page briefing paper in which you present a summary of your research about the topic and your recommendations as to what should be included in the training module. Be choosy about what you include Ã¢â‚¬â€œ the total training time available will be 30 minutes. DonÃ¢â‚¬â„¢t be too choosy however. Your recommended content should be comprehensive and fully address the training topic.
2. An analysis of the security and privacy issues that includes five or more key points about the topic (Ã¢â‚¬Å“data security and data loss preventionÃ¢â‚¬Â). Remember to stay focused on business travelers and mobile devices (laptops, tablet computers, cell phones, etc.)
3. Recommendations for 5 or more
based actions that managers and employees should take to address the identified security and privacy issues. Include at least one recommendation for a technology based solution (e.g. VPN, Mobile Device Management, Whole Disk Encryption, etc.) Include at least one recommendation for a policy based solution, i.e. implementing access controls based upon least privilege and/or separation of duties.
6. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more