Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Scenario 1 : Helena works remotely and commonly uses the mobile device issued to her to conduct client meetings and access the customer database. She

Scenario 1:Helena works remotely and commonly uses the mobile device issued to her to conduct client meetings and access the customer database. She is on the go a lot, and instead of using the secure 4G network issued by the company, she often uses the open access Wi-Fi network wherever a network might be available, such as at a Starbucks.
There is no company policy against the personal use of company mobile devices. She knows it is against company policy to download applications, such as games, that have not been approved by the IT department. She has done this in violation of the policy, but she only plays the games at work.
After reading the Scenario, answer the following questions:
Question 1:
The company has issued Helena the mobile device to work remotely to interact with clients and access the database. Is this the right thing to do?
1. No, the company should require her to be at her desk inside the firewall.
2. It is acceptable to do client meetings remotely, but database access has to be secured.
3. Considering that the company has issued her this device, they expect her to use it remotely provided she follows security procedures.
4. There is no problem. There is no need to be paranoid.
Question 2:
Is it all right for Helena to use the company issued mobile device on an open access network that is not password protected?
1. Absolutely not. Even if she does not access clients and client data, she is possibly exposing the device and the data it contains to other users.
2. She could be doing personal work, just not access any secure company data.
3. It is all right if she does it quickly. Keeping the connection open a long time could be risky.
4. Some people are so paranoid. The only people in Starbucks are coffee lovers, not snoopers.
Question 3:
Is it all right for Helena to be downloading games that have not been approved by the IT department?
1. It is quite all right to download the games, but she should not be playing them at work.
2. There is nothing wrong with downloading the game as long as she is playing within the security firewall.
3. Everyone needs to relax with games. This is an example of an improper security policy.
4. It is very wrong for her to disregard the security policy and the IT department. Games can come with spyware or malware. This is the big concern, bigger than her playing games at work.
Scenario 2:All the answers are given in the scenario. The company has issued Helena a mobile device with a secure 5G connection. They expect her to work remotely to conduct client meetings and access the company database. She does not need to use public Wi-Fi where her device and communications are exposed to other users, who could also overhear her or look over her shoulder. Using the secure 5G she can connect from any private area, such as inside her parked car.
It is very wrong of her to ignore the company security policy and the IT department with respect to games. The company has not banned games. They only require games to be vetted by the IT department so it is free of spyware and malware that can expose sensitive information.
After reading the Scenario, answer the following questions:
Question 1:
Which of the following best represents what Helena should do at work?
1. Focus on work and not play games.
2. Bring her own phone to play games at work.
3. It doesn't matter. One or two games will not hurt if she does not play too often.
4. Have her work phone scanned on a regular basis by the IT department.
Question 2:
Which of the following best represents what Helena should do when clients urgently request information from her when she is away from work?
1. Find a secluded location where she can use her secure 5G connection.
2. She should not answer the call.
3. She should answer and give the client a time when she can give the information.
4. She should only provide general information.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Introduction To Data Mining

Authors: Pang Ning Tan, Michael Steinbach, Vipin Kumar

1st Edition

321321367, 978-0321321367

More Books

Students also viewed these Databases questions