Verified Document

Accident Over The Last Several Research Paper

Once this occurs, you would then connect all of the different security protocols together. The basic idea is to be able to use them, to serve as a backup system in the event that there is some kind of breach. This will give the hackers limited access to: certain areas and it will isolate them to select parts of the company's servers. (Lacey, 2009, pp. 269 -- 310) The final part of the strategy is to ensure effective monitoring of the various systems. This will take place with the company using an outside security consultant. They will have the responsibility of helping to coordinate mock attacks. This will effectively test the strategy and identify for weaknesses. At the same time, they must train employees what to look out for and the possible warning signs of an early attack. This can be accomplished by: having different training modules coordinate with the security consultant. They will help to provide an initial foundation of knowledge....

At which point, they can work with employees to adjust to the changing nature of the threat. (Lacey, 2009, pp. 269 -- 310)
If this kind of strategy could be implemented, it will help to mitigate the current risks. Then, the security protocol will address medium term threats by: creating a number of secondary blocks that will protect each other. This will make it more difficult in conducting any kind of cyber attack. To ensure that the company is adapting to new threats, the security consultant will train staff members and test the system for breaches (in the form of a mock attack). Over the course of time, this strategy will reduce the chance of these kinds of incidents and it will make it difficult for hackers to retrieve any kind of sensitive information.

Bibliography

Lacey, D. (2009). Managing the Human Factor. Hoboken, NJ: Wiley.

Theriaut, C. (2011). CSIS Experts List Worst Cyber Breaches.…

Sources used in this document:
Bibliography

Lacey, D. (2009). Managing the Human Factor. Hoboken, NJ: Wiley.

Theriaut, C. (2011). CSIS Experts List Worst Cyber Breaches. Naked Security. Retrieved from: http://nakedsecurity.sophos.com/2011/03/21/worst-security-breaches-2010/
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now