In what ways did weaknesses in technical safeguards allow


Collaborate with students on the following exercise. In particular, consider using Google Docs, Windows Live SkyDrive, Microsoft SharePoint, or some other collaboration tool. Suppose the Chris and Jason, the groundskeepers at Fox Lake, are the same Chris and Jason that appeared in the Guide on pages 140-141.

After Chris was fired from his job, he wandered around, couldn't find professional work, and settled for cutting the grass at Fox Lake. He happened to tell Mike about his computer knowledge the day before Anne made her request for a report on membership data (see Chapter 9, pages 284-285). Mike thought giving Chris that task would possibly help Chris's professional job prospects as well as solve a problem for Fox Lake. Jason was working at Fox Lake part time, and it was he who hatched the scheme to steal expensive wedding presents.

Chris provided the data, and Jason did the stealing. Assume that the wedding events data and the membership data are stored in separate databases on the server in the facilities building. Access to both is protected via user account and password, but Mike leaves his passwords on his desktop computer monitor. The machines themselves are located in a backroom of the facilities building. Meeting with your group, answer the following questions:

1. In what ways did weaknesses in technical safeguards allow this situation to occur?

2. In what ways did weaknesses in data safeguards allow this situation to occur?

3. In what ways did weaknesses in human safeguards allow this situation to occur?

4. How should Fox Lake respond to this incident?

5. What security mistakes, if any, did each of the following make:

a. Anne

b. Mike

c. Jeff

d. Laura

6. If you were Jeff, how would you remedy the weaknesses you identified in your answers to questions 1-3?

7. Suppose you were on a job interview with the owner of a small business with IS systems and IT infrastructure similar to that of Fox Lake. If that owner were to ask you what the top three issues for IS security in a small business are, how would you respond?

Request for Solution File

Ask an Expert for Answer!!
Management Information Sys: In what ways did weaknesses in technical safeguards allow
Reference No:- TGS02612508

Expected delivery within 24 Hours