Verified Document

Accident Over The Last Several Research Paper

Once this occurs, you would then connect all of the different security protocols together. The basic idea is to be able to use them, to serve as a backup system in the event that there is some kind of breach. This will give the hackers limited access to: certain areas and it will isolate them to select parts of the company's servers. (Lacey, 2009, pp. 269 -- 310) The final part of the strategy is to ensure effective monitoring of the various systems. This will take place with the company using an outside security consultant. They will have the responsibility of helping to coordinate mock attacks. This will effectively test the strategy and identify for weaknesses. At the same time, they must train employees what to look out for and the possible warning signs of an early attack. This can be accomplished by: having different training modules coordinate with the security consultant. They will help to provide an initial foundation of knowledge....

At which point, they can work with employees to adjust to the changing nature of the threat. (Lacey, 2009, pp. 269 -- 310)
If this kind of strategy could be implemented, it will help to mitigate the current risks. Then, the security protocol will address medium term threats by: creating a number of secondary blocks that will protect each other. This will make it more difficult in conducting any kind of cyber attack. To ensure that the company is adapting to new threats, the security consultant will train staff members and test the system for breaches (in the form of a mock attack). Over the course of time, this strategy will reduce the chance of these kinds of incidents and it will make it difficult for hackers to retrieve any kind of sensitive information.

Bibliography

Lacey, D. (2009). Managing the Human Factor. Hoboken, NJ: Wiley.

Theriaut, C. (2011). CSIS Experts List Worst Cyber Breaches.…

Sources used in this document:
Bibliography

Lacey, D. (2009). Managing the Human Factor. Hoboken, NJ: Wiley.

Theriaut, C. (2011). CSIS Experts List Worst Cyber Breaches. Naked Security. Retrieved from: http://nakedsecurity.sophos.com/2011/03/21/worst-security-breaches-2010/
Cite this Document:
Copy Bibliography Citation

Related Documents

Science Fiction Film Comparison in the World
Words: 1081 Length: 3 Document Type: Essay

Science Fiction Film Comparison In the world of science fiction, anything and everything that is imagined is possible. Aliens can travel across the galaxies and come to the earth and be aggressive or friendly depending upon the story being told. As fantastic as these works are, within even the most bizarre scenarios there is a grain of realism. Some pieces of science fiction, whether written literature, television, or films, have inspired

Science and Fiction the Film Moon 2009
Words: 1773 Length: 6 Document Type: Essay

Science and Fiction The film Moon (2009) depicts the story of a man who is on a three-year mission on the moon mining helium-3 for people back on Earth. He is residing by himself and accompanied by a robot named GERTY. A couple of weeks before he gets to return to his family back on Earth, he starts to see things that are not there, including a teenage girl that he

Science, Society and Environment Application of FOX's
Words: 2280 Length: 7 Document Type: Essay

Science, Society and Environment Application of Fox's continuum values and their implications based on relationship between nature and society Science, society, and environment are three components of a person's life. No matter what part of the world an individual lives in, he or she will experience science, have a certain environment and a society all around him. These three components are also embedded within an individual. An individual forms society along with

Science and Religion: Problem of Other Minds or Lack Thereof
Words: 1079 Length: 3 Document Type: Essay

Science and Religion Does science discredit religion? In general we have the sense that, historically speaking, it does -- but only because so much of the historical conflict between science and religion has hinged upon the way in which scientific advances have disproved factual claims that were advanced by religion, or (as Worrall phrases it) where religion is "directly inconsistent with well-accredited scientific theories…the erstwhile religious claim…must, from a rational point-of-view,

Science Fiction Television As a
Words: 1661 Length: 5 Document Type: Essay

Audiences and their equipment and expectations have changed, too. Many have DVRs, streaming video, portable television, and certainly hi-def or plasma sets. Therefore, not only do they expect higher quality programming and effects, but network scheduling is now a moot point. Audiences can also engage in repeat viewings, watching and analyzing more attentively, which leads producers to create "increasingly sophisticated narrative worlds that sustain and reward intensive fan involvement on

Science and Religion Seek the Same Thing
Words: 1755 Length: 6 Document Type: Term Paper

Science and Religion Seek the Same Thing Science is the study of how the human race comprehends the world around them, while religion is what they apply to translate their study on the never-ending belief. There is a radical distinction between the two because the human beings use science to explain their relationship with God, while they use science to correlate with their surroundings. According to the Muslims and Christians, creation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now