The C-suites and SBOs (Small Business Owners) are planning to build a security system to identify and prevent malicious attacks posing a risk to physical loss or theft of sensitive information. Using the security system development lifecycle secSDLC, identify secSDLC phases and describe common steps for each phase.
The C-suites and SBOs (Small Business Owners) are planning to build a security system to identify and prevent malicious attacks posing a risk to physical loss or theft of sensitive information. Using the security system development lifecycle secSDLC, identify secSDLC phases and describe common steps for each phase.
![Having policies in place can mitigate the risk of physical security breaches
C-suites and SBOS (Small Business Owners) indicated external threats from vendors or contractors
|(25% C-suites; 18% SBOS) and physical loss or theft of sensitive information (22% C-suites, 19%
SBOS) are the top information security threats facing their business.
Yet, the number of organizations with a known and understood policy for storing and disposing of
confidential paper documents adhered to by all employees has declined 13% for C-suites (73% in 2019
to 60% in 2020) and 11% for SBOS (57% in 2019 to 46% in 2020).
In addition, 49% of SBOS have no policy in place for disposing of confidential information on end-of-life
electronic devices.
While the work-from-home trend has risen over the years, the COVID-19 pandemic abruptly launched
employees into work-from-home status, many without supporting policies.
77% of C-suites and 53% of SBOS had employees who regularly or periodically work off-site. Despite
this trend, 53% of C-suites and 41% of SBOS have remote work policies in place that are strictly
adhered to by employees working remotely (down 18% from 71% in 2019 for C-suites; down 8% from
49% in 2019 for SBOS).
"As we adjust to our new normal in the workplace, or at home, it's crucial that policies are adapted to
align with these changes and protect sensitive information," said Cindy Miller, president and CEO,
Stericycle.
"As information security threats grow, it's more important than ever that we help businesses and
communities protect valuable documents and data from the risks of an information breach."
Source: (Online] https://www.helpnetsecurity.com/2020/10/29/businesses-struggle-with-data-security-practices [Accessed on: 15 September
2021).](/v2/_next/image?url=https%3A%2F%2Fcontent.bartleby.com%2Fqna-images%2Fquestion%2Fa8a96dd5-acd1-46a9-8ff6-f9178c0c2e2c%2F8af4179c-57bb-490e-bac8-f3e2119bd44c%2Ffixrizj_processed.png&w=3840&q=75)
![](/static/compass_v2/shared-icons/check-mark.png)
Security system development lifecycle(secSDLC) is meant to assist developers in creating software and apps that greatly lowers security concerns at later stages. SecSDLC minimizes security flaws; its method includes identifying specific threats and the risks that such threats imply on the system and also implementing the necessary security measures to counter, abolish, and control the risks associated.
Step by step
Solved in 2 steps
![Blurred answer](/static/compass_v2/solution-images/blurred-answer.jpg)
![Computer Networking: A Top-Down Approach (7th Edi…](https://www.bartleby.com/isbn_cover_images/9780133594140/9780133594140_smallCoverImage.gif)
![Computer Organization and Design MIPS Edition, Fi…](https://www.bartleby.com/isbn_cover_images/9780124077263/9780124077263_smallCoverImage.gif)
![Network+ Guide to Networks (MindTap Course List)](https://www.bartleby.com/isbn_cover_images/9781337569330/9781337569330_smallCoverImage.gif)
![Computer Networking: A Top-Down Approach (7th Edi…](https://www.bartleby.com/isbn_cover_images/9780133594140/9780133594140_smallCoverImage.gif)
![Computer Organization and Design MIPS Edition, Fi…](https://www.bartleby.com/isbn_cover_images/9780124077263/9780124077263_smallCoverImage.gif)
![Network+ Guide to Networks (MindTap Course List)](https://www.bartleby.com/isbn_cover_images/9781337569330/9781337569330_smallCoverImage.gif)
![Concepts of Database Management](https://www.bartleby.com/isbn_cover_images/9781337093422/9781337093422_smallCoverImage.gif)
![Prelude to Programming](https://www.bartleby.com/isbn_cover_images/9780133750423/9780133750423_smallCoverImage.jpg)
![Sc Business Data Communications and Networking, T…](https://www.bartleby.com/isbn_cover_images/9781119368830/9781119368830_smallCoverImage.gif)