Question
1. As a Network and Security Administrator, you are asked to monitor employee activity during the day. Your AUP policy does not permit the use
1. As a Network and Security Administrator, you are asked to monitor employee activity during the day. Your AUP policy does not permit the use of outside devices. You noticed a rogue device on your network. What procedures do you follow to eliminate and prevent future usage of this device on your network? What happens to the owner of the device, who is NOT employed at your company?
2. You as a small business owner have chosen NOT to comply with the Federal credit card standards set forth on October 1st. You use your smartphone for customer transactions. Your smartphone is hacked and at least 20 customer credit card/identification information is stolen. What should you as a small business owner have done to protect your customers? (The answer is NOT they should have complied with the standards)
3. As the CEO of a 5A1 company, (reference Dun & Bradstreet for meaning), you have instructed your Chief Financial Officer and your Network Administrator to restructure your log-in procedures for employees, who use computer devices within your company. You noticed there are gaps. Some employees use a multi-level and some use a single sign-in. Briefly outline a structure from top to bottom defining the Authentication-Authorization-Access Control for the different groupings within the business. (NOTE: I am referencing a 5A1 company)
4. A threat is something that has the potential to cause us harm. Why is it so critical for organizations to analysis the threat level after each time critical information is identified?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started