Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Discussion Post Need A Response Please!!!! In response to your peers, using your security analyst perspective to counteract the adversarial mindset, how would you address

Discussion Post Need A Response Please!!!!

In response to your peers, using your security analyst perspective to counteract the adversarial mindset, how would you address the risks to the CIA that your peers have identified?

Work Devices on VPNs

Justin Holder

So, Walmart actually already uses both MFA and VPN's, especially for the work phones that they've given to every single associate in the company. But, it can be very easy to get through those since as long as they are connected to the internet, or if an associate just turned their phone into their primary phone, then as long as it's unlocked anyone can gain access to the Walmart network.

The only requirements for security on the work phones include a minimum 4-pin password and then you have to log into your Walmart account to access work functions, personal information, etc. Unfortunately this is incredibly unsafe because the phones will literally save your username and password for frequently used apps (You can turn this off in the security section of the device, but it should come standard instead). So for people that do not have a security mindset, which is going to be most of the company in all honesty, that's a huge security issue. As long as someone can figure out your pin number, any personal information you have is easy access.

That being said, they do back up their security by only allowing access to Walmart information if you are both on the clock and authorized to have access to that information, like staffing candidates, e-mails, and KPIs that the company keeps track of.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

New Trends In Databases And Information Systems Adbis 2019 Short Papers Workshops Bbigap Qauca Sembdm Simpda M2p Madeisd And Doctoral Consortium Bled Slovenia September 8 11 2019 Proceedings

Authors: Tatjana Welzer ,Johann Eder ,Vili Podgorelec ,Robert Wrembel ,Mirjana Ivanovic ,Johann Gamper ,Mikolaj Morzy ,Theodoros Tzouramanis ,Jerome Darmont

1st Edition

3030302776, 978-3030302771

More Books

Students also viewed these Databases questions

Question

When might the continuity assumption not be valid?

Answered: 1 week ago