Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your boss to present a summary of what the organization should do to prevent this from happening again.
Explain the goal of information security in relation to mobile devices.
Identify the three sources of threats, provide a summary of each, and provide at least one example of each.
Explain technical safeguards, and discuss which technical safeguard (s) should be used for mobile devices.
Explain data safeguards, and discuss which data safeguard (s) should be used in this type of scenario.
Explain human safeguards, and discuss which human safeguard (s) should be implemented.
Discuss why the organization needs an incident response plan to secure information and knowledge.
+1
Answers (1)
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the ...” in 📗 Business if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.