Verified Document

Accident Over The Last Several Research Paper

Once this occurs, you would then connect all of the different security protocols together. The basic idea is to be able to use them, to serve as a backup system in the event that there is some kind of breach. This will give the hackers limited access to: certain areas and it will isolate them to select parts of the company's servers. (Lacey, 2009, pp. 269 -- 310) The final part of the strategy is to ensure effective monitoring of the various systems. This will take place with the company using an outside security consultant. They will have the responsibility of helping to coordinate mock attacks. This will effectively test the strategy and identify for weaknesses. At the same time, they must train employees what to look out for and the possible warning signs of an early attack. This can be accomplished by: having different training modules coordinate with the security consultant. They will help to provide an initial foundation of knowledge....

At which point, they can work with employees to adjust to the changing nature of the threat. (Lacey, 2009, pp. 269 -- 310)
If this kind of strategy could be implemented, it will help to mitigate the current risks. Then, the security protocol will address medium term threats by: creating a number of secondary blocks that will protect each other. This will make it more difficult in conducting any kind of cyber attack. To ensure that the company is adapting to new threats, the security consultant will train staff members and test the system for breaches (in the form of a mock attack). Over the course of time, this strategy will reduce the chance of these kinds of incidents and it will make it difficult for hackers to retrieve any kind of sensitive information.

Bibliography

Lacey, D. (2009). Managing the Human Factor. Hoboken, NJ: Wiley.

Theriaut, C. (2011). CSIS Experts List Worst Cyber Breaches.…

Sources used in this document:
Bibliography

Lacey, D. (2009). Managing the Human Factor. Hoboken, NJ: Wiley.

Theriaut, C. (2011). CSIS Experts List Worst Cyber Breaches. Naked Security. Retrieved from: http://nakedsecurity.sophos.com/2011/03/21/worst-security-breaches-2010/
Cite this Document:
Copy Bibliography Citation

Related Documents

Legality Risk Management Over the Last Several
Words: 1651 Length: 5 Document Type: Essay

Legality Risk Management Over the last several years, there has been an increasing focus placed on the quality of health care services that an individual is receiving. This is because, a host of studies have shown that those who are provided with the highest quality of care will be able to see an improvement in their levels of health. A good example of this can be seen in an article that

Change Process Over the Last
Words: 1084 Length: 3 Document Type: Term Paper

These are designed to prevent any kind of burn out issues. Some of the most common techniques that can be utilized by the leadership during this process include: rethinking goals / objectives, looking at the speed of the changes that are taking place, making things fun and altering the team structure / format. Rethinking goals / objectives is when you are looking at if they are challenging enough for

Accident Investigation Improper Ergonomics Was the Cause
Words: 3134 Length: 10 Document Type: Term Paper

Improper Ergonomics caused USAir 1493 and SkyWest 5569 Accident Accident Investigation: Improper Ergonomics was the Cause Ergonomics was derived from two Greek words: ergon which means work, nomoi, on the hand means natural laws, in creating a word with the meaning, the science of work and an individual's relationship to that work. Another related definition according to International Ergonomics Association describe Ergonomics as the scientific discipline that deals with the understanding of

Accident Investigation
Words: 2442 Length: 5 Document Type: Research Paper

Airplane Crash Investigations Accident investigations are very different in regards to individual crashes. This paper examines the investigation of two plane crashes, Dallas Airlines Flight 191 and United Airlines Flight 173. The Dallas investigation did have good accessibility to the crash site with multiple first responding organizations from local municipalities, but with a slow reaction time. Meanwhile, United Airlines Flight 173 was clearly caused by pilot error, as the plane ran

Colgan Air Flight 3407 Accident
Words: 3090 Length: 12 Document Type: Research Proposal

On the hand, some plans may be slow to respond to the pilot's commands; complicating the piloting process, much like a sports car, for example, that under steers or a truck that over steers (Personal Communication, 2010). Bay contends that training on more than one plane of a particular model would prove to be a positive practice for airlines to implement. Bay asserts that the following questions need to be

Aircraft Accident Briefing the Accident
Words: 387 Length: 1 Document Type: Research Proposal

Mission: The sightseeing expedition did not report a particular flight plan. The charter was used for this flight in spite of recent reports of problems due to a shortage of available charters on the private island airport. Medium: The island runway ascended into foggy and hazy conditions that were reportedly worsening. Management: The pilot was not in contact with an management oversight but management did play a part in the shortcoming of certain procedures,

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now