SEC571 Week 4 Project Deliverable Netflix

pptx

School

DeVry University, Keller Graduate School of Management *

*We aren’t endorsed by this school

Course

571

Subject

Information Systems

Date

Dec 6, 2023

Type

pptx

Pages

13

Uploaded by aliciamlabonte31

Report
SEC571 Week 4 Security Control Selection Alicia LaBonte September 22, 2023 Professor Lamour
Rubric Criteria Total Include problem statement from previous deliverable 10 Identification of two alternative security controls 20 Qualitative analysis of risks 20 Security control selection and justification 30 Risk matrix chart (See Appendix A) 20 Total 100
Problem Statement According to the 2022 Data Breach Investigations Report that was published by Verizon, around 82 percent of data breaches were caused by the Human Element. This includes Social Attacks, Errors, and Misuse. The increased likelihood of successful Phishing attacks are because they are designed to target basic human responses specifically the urge to open correspondence, especially if it reaches their work inbox or it’s believed to be coming from a legitimate source or work colleagues (2022 Data Breach Investigations Report, 2022). Once users give the requested information, attackers can use it to get access to their personally identifiable information (PII) or sensitive personal information (SPI). This can hurt the organization as a whole and also cause "personal" problems like identity theft, fraud, and other scams. Because of this, all companies should put together strong and effective plans to stop hacking.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ADMINISTRATIVE CONTROLS
ADMIN. CONTROL OPTION #1- NEW HIRE POLICY ACKNOWLEDGMENT Qualitative Analysis Cost Effective Effective way to teach employees about information security rules and the consequences for not following them. Limits a company's legal responsibility for breaches that happen when employees don't follow Information Security Policies.
ADMIN. CONTROL OPTION #2-SETA PROGRAM Qualitative Analysis Using a Security Education, Training, and Awareness (SETA) Program is a very cost-efficient way to improve security. Implementing a program could be hard. Information security policies, procedures, and best practices should be taught to workers over time.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
TECHNICAL CONTROLS
TECHNICAL CONTROL OPTION #1- FIREWALL Qualitative Analysis • Costly to deploy and maintain • Effective defense against remote hacking and Trojan Horses • Monitor network traffic • Maintain privacy of sensitive information • Firewall security benefits outweigh deployment and maintenance costs, making it a must-have.
TECHNICAL CONTROL OPTION #2- ANTIVIRUS/ANTIMALWARE SOFTWARE Qualitative Analysis • Cost-effective defense • Provides protection from spam, spyware, and viruses • Provides web protection and firewall support • Offers free and paid software options o Free software is not recommended for large businesses Provides limited basic protection No performance guarantee
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
PHYSICAL CONTROLS
PHYSICAL CONTROL OPTION-CCTV SURVEILLANCE Qualitative Analysis • Expensive for high-definition cameras and storage capacity • Effective deterrence and aids in prosecution • Insurance premium discounts possible • A power failure might cause cameras to go offline, resulting in lost footage.
SOLUTION SELECTION Why SETA? Low-cost implementation and maintenance First line of protection for firm information assets is incident prevention, which is often the weakest link Ensure state, federal, and local compliance Protects from Phishing assaults Medium-to-high employee behavior influence o Employee empowerment o Encourages information security culture
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Netflix Risk Matrix Chart