SEC571 Week 6 Project Deliverable Netflix

pptx

School

DeVry University, Keller Graduate School of Management *

*We aren’t endorsed by this school

Course

571

Subject

Information Systems

Date

Dec 6, 2023

Type

pptx

Pages

10

Uploaded by aliciamlabonte31

Report
SEC571 Week 6 Implementation Plan Alicia LaBonte
Rubric Criteria Total Include problem statement slide from previous deliverable 5 Include recommended solution slide from previous deliverable 5 Implementation flow diagram 15 Cost-benefit analysis (CBA) 15 Solution validation 15 Solution evaluation and continuous improvement 15 Decommission 15 Legal, ethical and cultural considerations 15 Total 100
Problem Statement Verizon released the 2022 Data Breach Investigations Report, which said that people were responsible for about 82% of data leaks. This includes Misuse, Attacks on others, and mistakes. It's more likely that phishing attacks will work because they are designed to take advantage of basic human instincts, like the desire to open emails, especially if they come from a work email address or someone they thinks is legitimate (2022 Data Breach Investigations Report— 2022). Attackers can get to users' personally identifiable information (PII) or sensitive personal information (SPI) once they have the information they ask for. This is bad for the business as a whole and can also lead to "personal" issues like fraud, identity theft, and other scams. Since this is the case, every business should make strong plans to stop hackers.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Recommended Solution for Netflix Why SETA? Low-cost implementation and maintenance First line of protection for firm information assets is incident prevention, which is often the weakest link Ensure state, federal, and local compliance Protects from Phishing assaults Medium-to-high employee behavior influence o Employee empowerment o Encourages information security culture
Implementation Flow Diagram
Cost-Benefit Analysis (CBA) for Netflix Expectation of a single loss of $4,000,000 The annualized rate of occurrence (ARO) is 90%. Expected loss each year ALE pre-control = $4,000,000 x 0.9 = $3,600,000 The expected yearly loss after control is $0. The cost of Safeguard (SETA Program) every year is $5,000. CBA= $3,600,000-$0-$5000=$3,595,000
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Netflix Solution Validation Each effective cyber attack can cost a company as much as $4,000,000. About 91% of attacks start with a "phishing" email. There is, however, a simple and cheap way to reduce this risk. A Security Education and Training Awareness program (SETA) is the answer to this problem. Information security is only as good as the weakest link in the chain, which is why all employees of a company need to get the right education and training.
Evaluation and Continuous Improvement Many things that could go wrong with computer systems that could compromise their security In order to protect the privacy of private information, it is very important for businesses to use effective management strategies Suggested focusing on the SETA program to help workers learn more about how important information security is and to stress the part that employees play in the process The reason for this is that workers are the weakest link in the chain.
Decommission The SETA Program can never be shut down or decommissioned.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Legal, Ethical and Cultural Considerations The SETA program will continue to operate in accordance with the ethical and legal rules and standards set out by state, federal, and local agencies. Netflix’s policies will be applied to the resolution of any legal or ethical concerns that may surface.