Question

In: Economics

Task 3: Analysis of Case Study on Regulating Information Security for the Company: TransManuCo has asked...

Task 3: Analysis of Case Study on Regulating Information Security for the Company:

TransManuCo has asked for your help in dealing with securing their information while they remain within set regulations.

In order to do business efficiently and effectively the company uses eSign. However, they have concerns about the security of this especially with clients overseas.

According to the new Protecting Cyber Networks Act Sec. 103 “Permits private entities to monitor or operate defensive measures to prevent or mitigate cybersecurity threats or security vulnerabilities, or to identify the source of a threat, on: (1) their own information systems; and (2) with written authorization, the information systems of other private or government entities. Authorizes entities to conduct such activities on information that is stored on, processed by, or transiting such monitored systems.” Since this is a new act just passed by congress, the CEO of TransManuCo wants to be sure what the ramifications are for his company. With the increase in cyber attacks especially on companies such as his, he wants to take aggressive action to protect his information.

The HR department of TransManuCo needs assistance in dealing with issues that have surfaced surrounding social media. Since much of the work the company does is sensitive and secret, they have considered using social media background checks. However, they are unsure of the legalities.

The CEO and his immediate management team have concerns that as the company has grown rapidly, access to passwords and administrative privileges are too widespread. They would like to implement the Critical Security Control Regulations to help them get control of access to their systems and decrease vulnerabilities.

They are also concerned about wireless access from company employees traveling on business, especially overseas, whose computers become infected through remote exploitation during air travel. They believe this provides backdoor access to the network when the employees return to the main office and reconnect to the network.

Analyze the episodes in this case including:

  • A brief discussion of what the issue or threat is and how it could affect the company
  • What cyber security laws or compliance standards are affected
  • What actions the company should take to mitigate the issue or decrease the potential threat
  • Cite your sources in APA from reputable reference materials

Solutions

Expert Solution

A short talk of what the trouble or danger is and the manner in which it might affect the corporate What digital security laws or consistency measures are influenced What activities the corporate should need to alleviate the trouble or reduction the potential risk Cite your sources in APA from good reference materials.

The primary risk or issue is on (I) the organization's information (ii) composed documentation concerning the non-open or elective substances.

At the point when the employees working with their PCs all through their movement especially abroad, at that point their PCs get tainted just through the remote misuse that gives they the way to secondary passage getting to the system through the employees coming back to their geological point and reconnecting thereto.

These issues are raising for the corporate that has been started to well grown-up and spreading their systems.

In order to shield the advantages of the corporate, it's to establish various digital security laws or consistency standards. On the off chance that any risk is done, even though there are a couple of digital security laws and gauges, at that point the relating office should structure their laws and principles in order to shield their benefits like organization information and furthermore the composed approval.

The organization should build their measures inside the digital security the board rules, even though it acts simply like the forceful activities towards the staff.

See obviously and decide the establishment clarification for the threat

Assess the risk that reason the damage

Decide the instruments, methodologies, techniques rather confront the peril

Organizing these and fabricate appraisal on them.

Make guarantee of the assets that ought to be utilized alternatively.


Related Solutions

Task 3: Review Tia’s resume and suggest improvements based on the information provided in the case...
Task 3: Review Tia’s resume and suggest improvements based on the information provided in the case and instances where you consider the information provided is incomplete. Copy Tia’s resume into a new Word document and leverage track changes to highlight required modifications.
Case: Northridge Security Consultants, a security consulting company that specializes in network security for businesses, has...
Case: Northridge Security Consultants, a security consulting company that specializes in network security for businesses, has been using you as an outside contractor to provide research and customer service for their clients. A landscaping business, Sunset Landscapers, has contracted with NSC to help them implement cryptography to protect all documents and transmissions throughout their network. They have over twenty locations nationwide. NSC has found that even though the company would like this technology, the IT Director is resistant to any...
This case analysis relates to the case study, The details of the case study cover key...
This case analysis relates to the case study, The details of the case study cover key aspects of a financial report audit. For the purposes of this assignment, you are a senior auditor at Alex Gold Financial Services, an accounting firm. You have been assigned to the audit of Sheridan AV Ltd for the year ended 31 March 2021. The managing director of Sheridan AV, David Sheridan, is considering having Sheridan listed on the stock exchange and the Audit Partner,...
You have recently joined Royal Security Services as an information security intern. Your supervisor has asked...
You have recently joined Royal Security Services as an information security intern. Your supervisor has asked you to research two network firewalls. In this regard, you have to create a table by comparing features of firewalls in terms of filtering methods (stateless or stateful filtering), additional features these firewalls support (IDS, content filtering, etc.), and the cost of each firewall. Which one you would recommend to your supervisor? Justify your answer. please give answer in tabular form
You are asked to answer all the questions in the proposed case. This task assesses the...
You are asked to answer all the questions in the proposed case. This task assesses the following learning outcomes: Assess the present value of future cash flows and the future value of regular savings, annually and periodically. Understand the Perpetuity and annuity valuation and their factors – annual and periodical – and with various starting dates with and without growth. Demonstrate an ability to apply the technical skills in a practical context. LAUNCH: WEEK 10 / DELIVERY: MAY 10Tth, 2020,...
Background This case study compares benefit/cost analysis and cost effectiveness analysis on the same information about...
Background This case study compares benefit/cost analysis and cost effectiveness analysis on the same information about highway lighting and its role in accident reduction. Poor highway lighting may be one reason that proportionately more traffic accidents occur at night. Traffic accidents are categorized into six types by severity and value. For example, an accident with a fatality is valued at approximately $4 million, while an accident in which there is property damage (to the car and contents) is valued at...
Background This case study compares benefit/cost analysis and cost effectiveness analysis on the same information about...
Background This case study compares benefit/cost analysis and cost effectiveness analysis on the same information about highway lighting and its role in accident reduction. Poor highway lighting may be one reason that proportionately more traffic accidents occur at night. Traffic accidents are categorized into six types by severity and value. For example, an accident with a fatality is valued at approximately $4 million, while an accident in which there is property damage (to the car and contents) is valued at...
Background This case study compares benefit/cost analysis and cost effectiveness analysis on the same information about...
Background This case study compares benefit/cost analysis and cost effectiveness analysis on the same information about highway lighting and its role in accident reduction. Poor highway lighting may be one reason that proportionately more traffic accidents occur at night. Traffic accidents are categorized into six types by severity and value. For example, an accident with a fatality is valued at approximately $4 million, while an accident in which there is property damage (to the car and contents) is valued at...
In this case study, your task is to study different search algorithms to solve the N-Queens...
In this case study, your task is to study different search algorithms to solve the N-Queens Problem which has been presented in class. We will focus on the incremental formulation in which we add a queen to any square in the leftmost empty column that is not attacked by any other queen. We will compare the following algorithms: 1- Breadth-first Seatch (BFS) 2- Depth-first Search (DFS) 3- Simulated Annealing (SA) 4- Hill Climbing (HC) Question is:. Using any of the...
CASE 5.2 Business Case business case: Lax Security at Linkein Exposed. 7-Discuss why information security is...
CASE 5.2 Business Case business case: Lax Security at Linkein Exposed. 7-Discuss why information security is a concern of senior managers. 8-Explain why someone who used the same password for several sites would need to change all those passwords. In your opinion, was LinkedIn negligent in protecting its main asset? Explain
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT