CYBERSECURITY FOR “SMART-TOYS-SMART KIDS” Smart-Toys-Smart Kids is a toy manufacturing company with their own retail stores. They have been manufacturing and distributing toys to more than 150 retail stores in the region. The company has 500 employees in the Headquarters and conducts B2B transactions with their own retail stores. Consider the given the list of the IT assets and the their risk factors, fill out the cybersecurity control table for Smart-Toys-Smart Kids company Fire Flood Power loss Virus External intruder Internal intruder (80) Office computers Hardware - Headquarters (75) Client computers Hardware - Retail stores (70) Network devices (switch, router)- Headquarters (90) Internal Business application server –HQ (90) E-mail server – all offices (90) Web server – Headquarters (100) Financial Database - Headquarters (80) Wireless circuits- Headquarters (10) Printers – Headquarters (60) Central Data Storage facility - Headquarters (90) Software applications for all offices (100) Data Storage/memory - Headquarters (100) Database Server- Headquarters (100) Database Server- Retail stores USE THE FOLLOWING CONTROL ITEMS Disaster recovery plan and education / training Halon fire system & sprinklers Not on or below ground level UPS (uninterruptible power source) Virus checking software present and updated Extensive user training about viruses Strong password policy Extensive user training about password security Application-layer firewall Firewall for data communication in &out of the system Content filtering at the Gateway Multi-factor authentication
Smart-Toys-Smart Kids is a toy manufacturing company with their own retail stores. They have been manufacturing and distributing toys to more than 150 retail stores in the region. The company has 500 employees in the Headquarters and conducts B2B transactions with their own retail stores. Consider the given the list of the IT assets and the their risk factors, fill out the cybersecurity control table for Smart-Toys-Smart Kids company
|
Fire |
Flood |
Power loss |
Virus |
External intruder |
Internal intruder |
(80) Office computers Hardware - Headquarters |
|
|
|
|
|
|
(75) Client computers Hardware - Retail stores |
|
|
|
|
|
|
(70) Network devices (switch, router)- Headquarters |
|
|
|
|
|
|
(90) Internal Business application server –HQ |
|
|
|
|
|
|
(90) E-mail server – all offices |
|
|
|
|
|
|
(90) Web server – Headquarters |
|
|
|
|
|
|
(100) Financial |
|
|
|
|
|
|
(80) Wireless circuits- Headquarters |
|
|
|
|
|
|
(10) Printers – Headquarters |
|
|
|
|
|
|
(60) Central Data Storage facility - Headquarters |
|
|
|
|
|
|
(90) Software applications for all offices |
|
|
|
|
|
|
(100) Data Storage/memory - Headquarters |
|
|
|
|
|
|
(100) Database Server- Headquarters |
|
|
|
|
|
|
(100) Database Server- Retail stores |
|
|
|
|
|
|
USE THE FOLLOWING CONTROL ITEMS
- Disaster recovery plan and education / training
- Halon fire system & sprinklers
- Not on or below ground level
- UPS (uninterruptible power source)
- Virus checking software present and updated
- Extensive user training about viruses
- Strong password policy
- Extensive user training about password security
- Application-layer firewall
- Firewall for data communication in &out of the system
- Content filtering at the Gateway
- Multi-factor authentication
Trending now
This is a popular solution!
Step by step
Solved in 2 steps