why the listed events are considered high priority
docx
keyboard_arrow_up
School
University of Phoenix *
*We aren’t endorsed by this school
Course
TAXATION
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
3
Uploaded by AdmiralPonyMaster845
1
Name
Course
Date
Customer data at risk of exposure or compromise:
Due to the confidentiality and need to
secure consumer data, this event is of high priority. Identity theft, financial loss, and other
negative repercussions could result from exposed or compromised consumer data (
Thomas et.al.,
2017)
. An instance of a high priority event would be if a hacker gained access to a company's
client database and stole credit card information.
Unauthorized use of a system for any purpose:
This is a high priority event because
unauthorized use of a system can led to data breaches, malware infections, and other security
risks (
David et al., 2022)
. For example, if an employee were to access a system without
permission and download confidential information, this would be considered a high priority
event.
DoS attack:
This is a high priority event because a DoS attack can cause significant disruption
to a company's operations. For example, if an attacker were to flood a company's website with
traffic, this would be considered a high priority event.
Unauthorized downloads of software, music, or videos
: This is a high priority event because
unauthorized downloads can lead to malware infections and other security risks. For example, if
an employee were to download a malicious file from the internet, this would be considered a
high priority event.
Missing equipment:
Due to the possibility of data breaches and other security issues, this is a
high priority event. For instance, it would be a high priority event if an employee left their laptop
unattended in a public setting.
2
Suspicious person in the facility:
Because people acting suspiciously can be a risk to the safety
of both personnel and consumers, this activity has been given a high priority. For instance, if an
unidentified person were to enter the facility without authorization, this would be seen as a
situation that requires immediate attention.
3
References
David, D. S., Anam, M., Kaliappan, C., Arun, S., & Sharma, D. K. (2022). Cloud security service
for identifying unauthorized user behaviour.
CMC-Computers, Materials &
Continua
,
70
(2), 2581-2600.
Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., Invernizzi, L., ... & Bursztein, E. (2017,
October). Data breaches, phishing, or malware? Understanding the risks of stolen
credentials. In
Proceedings of the 2017 ACM SIGSAC conference on computer and
communications security
(pp. 1421-1434).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help