CYB_250_MODULE5SHORTRESPONSE_SABRINA_WYMAN

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

250

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by ProfessorOxideSnake114

Report
Wyman 1 Module 5 short response CYB 250 Sabrina Wyman 02/17/2024 In the given situation we was able to conduct a routine security audit in which a breach was then identified. When it comes to trying to explain the
Wyman 2 given situation to senior management we would need to detail the information into terms that can be relatable to the staff and not just those trained within the IT fields. This scenario could be best described as a break- in at the store using this example will allow the management to understand the situation they are facing. By using terms and examples that are more relatable to other non-IT employees we are able to deal with the situation in a timely manner instead of spending more time just trying to explain the IT terminology of it all. When looking over this breach there are two CIS controls that I would suggest in implementing. These CIS controls are CIS control 6 and CIS control 10. I chose these two controls because CIS control 6 is an access control management where as CIS control 10 concerns the use for malware and ransomware technology. CIS control 6 is a critical component when it comes to maintaining information and system security as well as restricting the access to assets based on their role and need. This alone would allow for a greater security control over information and restricts the number of users that are able to destroy or simply corrupt sensitive information. With the addition of CIS control 10 we are able to have something that would lay out the minimum requirements when it comes to security to ensure the companies malware defenses are up to the job. In today’s world implementing and maintaining any form of malware protection is essential for any business’s technology outlook. All businesses could fall victim to
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help