[SOLVED] Discussion 1 Replies

I’m studying for my Computer Science class and don’t understand how to answer this. Can you help me study?

Struggling to find relevant content or pressed for time? – Don’t worry, we have a team of professionals to help you on
[SOLVED] Discussion 1 Replies
Get a 15% Discount on this Paper
Order Now

please read below posts and provide replies to each one in 125 words.No need to provide answer to the main question.Just go through the below student posts and reply accordingly.

Main que:

Your boss mentions that recently a number of employees have received calls from individuals who didn’t identify themselves and asked a lot of questions about the company and its computer infrastructure. At first, he thought this was just a computer vendor who was trying to sell your company some new product, but no vendor has approached the company. He also says several strange e-mails requesting personal information have been sent to employees, and quite a few people have been seen searching your company’s trash dumpsters for recyclable containers. Your boss asks what you think about all of these strange incidents. Respond and be sure to provide recommendations on what should be done about the various incidents.

Ka-The organization must develop the information security awareness programs and training and then provide guidance and advices to their employees in requiring the policy’s clarification. Also, the policy will need to be developed in encouraging employees in raising the possible information security problems or issues with the managers immediately. Security measures or precautions likely emails that contain the information which is been classified, as the organization confidential, should be encrypted when is sent external of the network of the organization. To an utmost extent likely, emails from company will not ask any of the sensitive or the personal data or information, that will be usually requested in the phishing attack likely in the given scenario or case where employees received emails and were asked about personal information and the attacks will needs to be reported to IT or the company Infrastructure security department immediately. The site might obtains personal information from unsuspecting clients or installing the malicious software and those circumstances will need to immediately reported in protecting the company data theft or loss. (Bazzell & Carroll, 2016)

Moreover, company should take the measures by monitoring internet transmission on the networks will include tracking internet sites that are been visited, the content of the information or the messages received or sent, the time spent by individual employee on internet through company property and other actions of the Internet usage. Any of the evidence of the misuse of information by employee must be reported as violation. Sensitive or confidential information is been transmitted over internet should be encrypted. Any downloaded software should comply with provisions of company computer software and hardware requirements.

Phishing is an attempt for acquiring the sensitive information like as username, passwords and the credit card information, often for the malicious reasons by hidden as trustworthy individual in electronically communication like as email. (Kenneth, Heather & Richard, 2017) Associates of company must take responsibility to recognize the phishing scams or attacks. Passwords should be changed very often most likely for every 2 or 3 months and the strong password should be set for the accounts. As attacker in the scenario were searching company scrap dumpsters, so the documents shred services should be in the place in destroying any of the documents that will contain the sensitive or the personal information or any sort or type of the confidential information that will be usually from the fax. Place dumpsters in the area where they could be monitored likely by arranging the electronic detection device that include the motion sensitive camera. Measures could be taken by the implementing of infrastructure’s network with firewall, Proxy system, Gateway will reduces the risks of the attacks.

she-Corporate organizations are becoming susceptible to cyber-assaults every day because of a lack of proper security. Securing IP addresses, organization exclusive records, and Employee information is most important to no longer fall as a victim to cyber-assaults.

To keep in a massive picture it is greater vital to at ease information inside the agency because the crucial statistics are disclosed to all employees rather than the key gamers are the principle motive for facts breaches.

To conquer breaches and attacks:

Companies ought to have a privateness coverage up to date were the best key personnel can get admission to the records and for the employee-owned devices which cause extra threats must have an audit path created. So with this, we will realize the statistics of login and the person that accessed the device at some particular time.

The organization must educate its very own personnel about the statistics breaches and precautions to ease the data for which they have to get right of entry to. All employees should be nicely informed approximately data sharing, data protection, and online behaviors.

They have to have the right information about what is going on of their gadgets and if there is a suspicious activity spotted it ought to be without delay mentioned to a network protection or help group.

Most importantly IT branch has to be proactive to take steps beforehand like facts encryption, sensitive statistics with encrypted keys, controlling get admission to the employees and all of the information must ultimate with the enterprise.

Recently forensic professionals have been investigating Yahoo data breach prompted in past due February this yr.500 million bills have been hacked the usage of cast cookies which allow gaining access to money owed without coming into passwords. The hacked information includes the date of births, solutions to security questions and all email addresses.

This breach is prompted due to the usage of or taking those forged cookies via the consumer account which is a third-party breach. Having regarded these records about malicious assaults proper precautions and green steps to be taken and endorsed which I stated above.

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with MyCoursebay
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Customer 452813, July 5th, 2022
Thank you , this is perfect !
Customer 452795, May 15th, 2022
Business and administrative studies
Thank you very much for your help.
Customer 452861, September 16th, 2022
public speaking
The work was excelent and very professional.
Customer 452653, November 1st, 2021
Social Work and Human Services
Great Job!
Customer 452587, October 27th, 2021
Great writer (Proske). I highly recommend
Customer 452531, July 10th, 2021
Criminal Justice
Impressive! Will be using the service again.
Customer 452485, December 5th, 2021
Customer 452813, June 19th, 2022
Strategic Management
Thank you very much for the help, really appreciate it
Customer 452821, June 27th, 2022
Always on time and a life saver for sure!!!!!!!!!!!!
Customer 452453, October 22nd, 2021
Social Work and Human Services
Great Work!
Customer 452587, September 8th, 2021
Human Resources Management (HRM)
Thank you
Customer 452531, May 19th, 2021
Customer reviews in total
Current satisfaction rate
3 pages
Average paper length
Customers referred by a friend
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Thank you for choosing MyCoursebay. Your presence is a motivation to us. All papers are written from scratch. Plagiarism is not tolerated. Order now for a 15% discount

Order Now