Define an auditing plan which includes scope benchmarks


Assignment

Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure. Define an auditing plan which includes:

• scope
• benchmarks
• data-collection
• post-audit activities
• log management
• testing of security systems

Select three of the following end-user breaches for your assignment:

• Open network drive shares allow storage privileges to outside users.
• Sensitive laptop data is unencrypted and susceptible to physical theft.
• Remote users do not have recent patches or current updates.
• Removable storage drives introduce malware filtered only when crossing the network.
• Predictable passwords meet minimum length requirements but remain easily guessable.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Define an auditing plan which includes scope benchmarks
Reference No:- TGS02461616

Now Priced at $30 (50% Discount)

Recommended (94%)

Rated (4.6/5)