Security breach evaluation Assignment

User Generated

taae2128

Other

Description

Learning Objectives and Outcomes

  • Analyze the given case study on security breach.
  • Recommend controls to avoid an enterprise security breach.

Assignment Requirements

Read the text sheet named “Local Breach of Sensitive Online Data” and address the following:

Using what you have learned about security breaches, describe what measures should have been taken by the educational service and test preparation provider to avoid the security breach mentioned in the text sheet.

Respond to your peers with your point of view on their answers. Make sure your opinion is substantiated with valid reasons and references to the concepts covered in the course. In addition, initiate a discussion with the students who comment on your answer.

After the discussion, you need to prepare a summary report. The report should include the following:

  • Explanation of the security controls that could have prevented the security breach
  • Rationale for choosing the security controls

Required Resources

  • Text sheet: Local Breach of Sensitive Online Data (ts_localbreach)

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double-Space
  • Citation Style: Follow your school’s preferred style guide
  • Length: 2 pages
  • Citation Style: APA with at least 2 Refferences

Self-Assessment Checklist

Use the following checklist to support your work on the assignment:

  • I have engaged in a discussion of the assigned topics with at least two of my peers.
  • I have raised questions and solicited peer and instructor input on the topics discussed.
  • I have articulated my position clearly and logically.
  • I have supported my argument with data and factual information.
  • I have provided relevant citations and references to support my position on the issue discussed.
  • I have compared and contrasted my position with the perspectives offered by my peers and highlighted the critical similarities and differences.
  • I have solicited peer and instructor feedback on my arguments and propositions.
  • I have offered a substantive and critical evaluation of my peer’s perspective on the issues that is opposite of mine, and supported my critical review with data and information.
  • I have followed the submission requirements.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: SECURITY BREACH EVALUATION

Security breach evaluation
Name:
Professors name:
Course:
Date:

1

SECURITY BREACH EVALUATION

2

Security breach evaluation
Introduction
The large organization often feels that breaching of data in their organization is
almost impossible. However, an organization should undertake the appropriate
measures and ensure that security breaches do not occur.Therefore; the essay is about
the analysis of the fictional company as well as the appropriate measure to adapt to
prevent security breach (Safa, Von & Fu rnell, 2016).
Analysis
The fictional company experienced data breaching whereby the company’s files
were exposed to about 100,000 students. The company’s documents were exposed as
the firm had changed the internet providers. Some of the information exposed includes
personal inform...


Anonymous
Great! Studypool always delivers quality work.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags