AminataFunchess BUS 519 assign4.docx

Management should determine the most vulnerable

Info icon This preview shows pages 4–6. Sign up to view the full content.

View Full Document Right Arrow Icon
second data breach, the mitigation process is extremely important at this stage. Management should determine the most vulnerable inside and outside threats to their data security. Setting up additional security measures such as additional passwords and a two-person authentication process for highly sensitive data. “Identify and maintain awareness of the risks that are "always there" interfaces, dependencies, changes in needs, environment and requirements, information security, and gaps or holes in the program” (Risk Mitigation Planning, Implementation, and Progress Monitoring," 2015). Completing these steps and monitoring each risk properly will hopefully avoid any further damage to the company and its reputation. Determine if budget / schedule changes are necessary and explain why. Budget and schedule changes would be necessary. If the top threat of an additional security breach has occurred, funds would need to be reallocated to fund damage control efforts. The initial budget of $100,000 would need to be reassessed and the training budget may need to be cut in order to allow funding geared towards any software needed. The Public Relations contractor may also need to reevaluate the situation to suggest the most effective way to relay the information to customers. Vice President Lauren’s training budget would have to be cut significantly. Instead of attending external training, Lauren can benefit from shadowing and coaching from internal IT staff members. Update the risk register and highlight the changes made. Provide the justification for the changes. Description Cause Risk Effect
Image of page 4

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
PROJECT PROCESS 5 Data Breach Problems in new software system and inefficient staff to run proper security scans and checks. Possible internal threat, disgruntled employee Customers’ information is compromised again Business loses all credibility, customers switch to competitors Loss of business and trust from clientele Loss of business is so detrimental causing store closures Employee Theft Possible issues with management or former employee that still has access to systems and information Disgruntled employee steals customer information to harm business Information is stolen and sold to competitors or black market Customers’ information is compromised, loss of business Company faces closures and law suits Staff Incompetence Lack of proper training and or insufficient resource availability Unaware of how to prevent threats, security scans not run Data breaches, secure information compromised, low morale Staff members are fired or leave company in fear of closures Public Reaction Data breaches, Information leaked to public or provided by Flayton’s Trust lost in the company,
Image of page 5
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern