why the listed events are considered high priority

docx

School

University of Phoenix *

*We aren’t endorsed by this school

Course

TAXATION

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

3

Uploaded by AdmiralPonyMaster845

Report
1 Name Course Date Customer data at risk of exposure or compromise: Due to the confidentiality and need to secure consumer data, this event is of high priority. Identity theft, financial loss, and other negative repercussions could result from exposed or compromised consumer data ( Thomas et.al., 2017) . An instance of a high priority event would be if a hacker gained access to a company's client database and stole credit card information. Unauthorized use of a system for any purpose: This is a high priority event because unauthorized use of a system can led to data breaches, malware infections, and other security risks ( David et al., 2022) . For example, if an employee were to access a system without permission and download confidential information, this would be considered a high priority event. DoS attack: This is a high priority event because a DoS attack can cause significant disruption to a company's operations. For example, if an attacker were to flood a company's website with traffic, this would be considered a high priority event. Unauthorized downloads of software, music, or videos : This is a high priority event because unauthorized downloads can lead to malware infections and other security risks. For example, if an employee were to download a malicious file from the internet, this would be considered a high priority event. Missing equipment: Due to the possibility of data breaches and other security issues, this is a high priority event. For instance, it would be a high priority event if an employee left their laptop unattended in a public setting.
2 Suspicious person in the facility: Because people acting suspiciously can be a risk to the safety of both personnel and consumers, this activity has been given a high priority. For instance, if an unidentified person were to enter the facility without authorization, this would be seen as a situation that requires immediate attention.
3 References David, D. S., Anam, M., Kaliappan, C., Arun, S., & Sharma, D. K. (2022). Cloud security service for identifying unauthorized user behaviour. CMC-Computers, Materials & Continua , 70 (2), 2581-2600. Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., Invernizzi, L., ... & Bursztein, E. (2017, October). Data breaches, phishing, or malware? Understanding the risks of stolen credentials. In Proceedings of the 2017 ACM SIGSAC conference on computer and communications security (pp. 1421-1434).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help