Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1. TheReportingMechanism through whichemployeesare ableto report suspected breachesofsecurity, needstobe: Select the correct response(s) a) ClearOrganisationsneedto ensure that their employeesknowwhichprocesses to followandwho to gotoifthey have

Question 1.

TheReportingMechanism through whichemployeesare ableto report suspected breachesofsecurity, needstobe:

Select the correct response(s)

a) ClearOrganisationsneedto ensure that their employeesknowwhichprocesses to followandwho to gotoifthey

have any concernssecurityhasbeen breached.

b) Direct Reports should be made directly to line managers, who need to assume responsibility for ensuring their staff are aware of the reporting process, keep tabs on their employees concerns, and reassure them the process is

confidential.

c) DevolvedEmployeesshouldtake responsibility forkeepingthemselvesup to date on which reporting

processestofollowandwho togotoifthey have concernsabouta potential securitybreach.

d) ConfidentialEmployeesneedtoknowthereportingmechanism is confidential,even ifreportingtheissue

couldeventuallydamage an organisation's operations, commercialinterests orexposeIt to legal prosecution.

e) AccountableMalicious whistleblowingisa serious and growing problemformanymodern organisations; employeesneedtobeawarethatconfidentialityisconditionalupon significantevidencebeingpresented,and that misreportingan issuewill have seriousdisciplinary repercussions.

image text in transcribed
BBACS Corporate Security X ? Q Progress 41% Implications Case Study 2 Instructions Submissions Hacktivist Anonymous Anonymous Submissions Assignment Beginnings Here are your latest answers: 2 Type: Quiz > Modus Operandii . Max score: 25 > PayPal Attack Question 1 Category: Quiz > Other Attacks E Which of the following are techniques used in the computer/systems forensic investigative process? Relevance for Timer: 40:00 (mm:ss) Systems / Response: Data extraction Corporate Forensics as Part Conclusion Question 2 > Corporate Forensics in Summary E The actions of the hactivist group 'Anonymous' illustrate.. F > Corporate Forensics Response: ...how hactivist groups have become so sophisticated that corporate forensics now need to be considered a part and Types of Threat of a wider corporate security strategy aimed at managing the impact of such attacks, rather than as a means of preventing Integrating Corporate them 8/25 (33%) > Forensics into the Corporate Security Strategy: Score: 0 out of 1 X 6 This assignment has a completion requirement; you must score at least 70%. The Challenges of

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Management Information Systems

Authors: Ken Laudon, Kenneth Laudon, Jane Laudon

12th Edition

0132142562, 9780132142564

More Books

Students also viewed these General Management questions

Question

Pollution

Answered: 1 week ago

Question

The fear of making a fool of oneself

Answered: 1 week ago