Question
Question 1. TheReportingMechanism through whichemployeesare ableto report suspected breachesofsecurity, needstobe: Select the correct response(s) a) ClearOrganisationsneedto ensure that their employeesknowwhichprocesses to followandwho to gotoifthey have
Question 1.
TheReportingMechanism through whichemployeesare ableto report suspected breachesofsecurity, needstobe:
Select the correct response(s)
a) ClearOrganisationsneedto ensure that their employeesknowwhichprocesses to followandwho to gotoifthey
have any concernssecurityhasbeen breached.
b) Direct Reports should be made directly to line managers, who need to assume responsibility for ensuring their staff are aware of the reporting process, keep tabs on their employees concerns, and reassure them the process is
confidential.
c) DevolvedEmployeesshouldtake responsibility forkeepingthemselvesup to date on which reporting
processestofollowandwho togotoifthey have concernsabouta potential securitybreach.
d) ConfidentialEmployeesneedtoknowthereportingmechanism is confidential,even ifreportingtheissue
couldeventuallydamage an organisation's operations, commercialinterests orexposeIt to legal prosecution.
e) AccountableMalicious whistleblowingisa serious and growing problemformanymodern organisations; employeesneedtobeawarethatconfidentialityisconditionalupon significantevidencebeingpresented,and that misreportingan issuewill have seriousdisciplinary repercussions.
BBACS Corporate Security X ? Q Progress 41% Implications Case Study 2 Instructions Submissions Hacktivist Anonymous Anonymous Submissions Assignment Beginnings Here are your latest answers: 2 Type: Quiz > Modus Operandii . Max score: 25 > PayPal Attack Question 1 Category: Quiz > Other Attacks E Which of the following are techniques used in the computer/systems forensic investigative process? Relevance for Timer: 40:00 (mm:ss) Systems / Response: Data extraction Corporate Forensics as Part Conclusion Question 2 > Corporate Forensics in Summary E The actions of the hactivist group 'Anonymous' illustrate.. F > Corporate Forensics Response: ...how hactivist groups have become so sophisticated that corporate forensics now need to be considered a part and Types of Threat of a wider corporate security strategy aimed at managing the impact of such attacks, rather than as a means of preventing Integrating Corporate them 8/25 (33%) > Forensics into the Corporate Security Strategy: Score: 0 out of 1 X 6 This assignment has a completion requirement; you must score at least 70%. The Challenges of
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started