Imagine yourself in the role of a security manager at a midsize engineering firm
ID: 3916020 • Letter: I
Question
Imagine yourself in the role of a security manager at a midsize engineering firm. Leakage of intellectual property is a great concern to your management, because it is your company's main product, and it is all developed on internal IT systems. They are concerned about all the ways that engineering drawings and other sensitive documents could "walk away," and have asked you to make security policies more strict, to help prevent that. Submit a 2- to 3-page document that contains responses to the following questions: ldentify three policies you think employees should be trained in to protect against data leakage. Explain why you chose these. Explain the consequences if these policies are not well explained to the end users. Note: These could be new policies or existing policies that you feel are not followed as well as they could be. Create a simple Appropriate Use Policy, defining the proper use of network resources, and list the things that you feel employees should not be doing at work. Note: Consider the risk if they surf Web sites and use social media Web sites and externally hosted e-mail. You have to decide where the line is drawn, given that these are employees who should feel the company values their work. This policy should strike a balance between personal usage and business usage, which is appropriate for this type of business. List three different ways to train users or raise awareness about the new Appropriate Use Policy Explain how you will enforce this policy and measure the success of your training.Explanation / Answer
As of a data security manager I would like to impose the following steps to prevent the data security among the company.
Be aware that which data has to be protected or more valuable.
That we can spend much time on that particular data.
And we have to aware of the location of the particular data in the company.
To know about the environmental factors and how secure it actually was.
Encryption is the gift in the data protection issue.
This will made hackers more complex and unable to predict what actually we are sharing among us.
The simple way to protect the data is to limit the accessing people to the data and make it under password protection by the higher authority.
We will get an idea by whom or by what method the data loss has occurred actually
Nowadays the cloud storage is getting popular among the mid sized firms that are very important in choosing the right cloud vendor.
Proper investigation is must to know about their performance and history.
Privacy policies has to be made very strict and kept public among the workers
To give more complexity for the hackers.
Awareness programs has to be conducted every month about the data phishing, data stolen etc.
Proper training will make a better place to work together.
Incidents have to be created if there is a data loss occurs, that will prevent the data from further loss.
Prediction of error loss will be quicker and the damage will be reduced.
Recommending strong and complicated passwords for the database accessing people.
This will give better security.
The threats from outside will be at very high potential and we cannot predict what actually it is, so a more efficient experienced worker has to be placed as a data manager.
We can hire a hacker on our own and offer him a bounty and ask him/her to break our security walls. That will make us to understand how we weak and where we stand at the security level. It can be used to improve the protection level.
Backing up and recovery has to be made every month automatically to protect the data loss at any cause like system failure or natural disaster.
Always maintain the data in a server in three different places all over the world.
Passwords and keys has to be changed every month will make hacker more complicated.
If the above solution is helpful to you in any way please rate it Or if you have any concerns please comment it, I will help you through
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.