Information Systems Management

profilemarmaydec
Instructions

Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your boss to present a summary of what the organization should do to prevent this from happening again. Create a PowerPoint presentation of your summary. In your PowerPoint presentation, you should include the components listed below.

  • Explain the goal of information security in relation to mobile devices.
  • Identify the three sources of threats, provide a summary of each, and provide at least one example of each.
  • Explain technical safeguards, and discuss which technical safeguard(s) should be used for mobile devices.
  • Explain data safeguards, and discuss which data safeguard(s) should be used in this type of scenario.
  • Explain human safeguards, and discuss which human safeguard(s) should be implemented.
  • Discuss why the organization needs an incident response plan to secure information and knowledge.

Your presentation must be a minimum of six slides in length, not counting the title and reference slides. Be sure that any graphics used are appropriate and support the content of your presentation. You must use at least two references in your presentation, and they should be cited and referenced in APA format. Please cite all sources used.

    • Posted: 9 days ago
    • Due: 
    • Budget: $5
    Answers 1
    • Information Systems Management
      Answer rating:5Stars out of1ratings

    Purchase the answer to view it

    blurred-text
    • Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security …

    • Instructions

      Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, …

    • Instructions

      Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology …

    • Instructions

      Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security …

    • Instructions

      Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology …

    • Not rated

      Power Point

      Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security …

    • Not rated

      2 assign

      I need this 2 assignments in 15 hours. For assignment two see attached file.




      Assignments


      Recently, a terminated employee used his mobile device to log in to the company network and steal …