7-1 Project Three Submission Technical Brief - Copy
.pdf
keyboard_arrow_up
School
Full Sail University *
*We aren’t endorsed by this school
Course
200
Subject
Information Systems
Date
Apr 3, 2024
Type
Pages
6
Uploaded by streaming85
Nickolas Cook Southern New Hampshire University CYB 200 7-1 Project three Submission: Technical Brief Mr. James Pierce February 25, 2024
Scenario You are employed in a government agency that works with the United States Army on top-secret military contracts. The company you work for is secure and practices cybersecurity awareness monthly. You arrive to work simultaneously as Jan, a work colleague you have known since college. You have known her to be a solid worker, though always down on her luck financially. Recently, you've noticed that she has begun to wear nicer clothes and expensive jewelry. You observe the standards signs detailing the no cell phone and no Internet of Things device policies as you enter work. As she cleans up her lunch area, you watch Jan putting her android tablet into her backpack on your lunch break. When you ask her about it, she says that she only uses the tablet to read the newspaper and only does so during lunch. Later that day, you enter Jan's office to ask her a question about the upcoming project, and you witness her using that same device to take a picture of a schematic for the project. When you confront her, she explains that she has fallen way behind and needs the diagram to catch up on work while at home. You mention the situation to your supervisor, which leads to a formal investigation of Jan's recent activity. It is discovered that pictures taken using her tablet have been uploaded to cloud storage. A. Identify your threat actors and characterize their motivations or desired outcomes. Use research from the Project Three resource guide or decision aid to support your response. For example, is the threat actor gathering information for financial gain? In this scenario, Jan is suspicious because she did not follow security protocol. She is an employee of the United States Army and works on top-secret military contracts, even though the
company is secure and practices cybersecurity awareness monthly, Jan did not follow the policy. According to Taylor and Steele (2018), it is argued that threats may be either deliberate or accidental. Nonetheless, it should be noted that not all threats are malicious, and a multitude of unanticipated threats have the potential to cause harm, even if they are malicious (Taylor and Steele, 2018). Jan shows her irresponsibility by using her Android tablet to picture a schematic for the project. Jan may be collecting information for financial gain because she has been wearing expensive clothes and jewelry lately. Furthermore, I can describe Jan as an insider theft because of her insider information and knowledge. It is possible that she possesses sophisticated skills and is motivated by financial gain (as a member of organized crime); however, it is uncertain for how long she has been engaged in this activity and what her true motive is. B. Describe ethical and legal factors that should be considered and their significance in the company you are employed in. Use research from the Project Three resource guide or decision aid to support your response. Legal standards are outlined in government laws based on written law, while cyber-ethics is what separates security personnel from hackers (
Yang and Bhunia, 2021
). It is the ability to understand right and wrong and adhere to ethical principles while on the job. Jan must have a strong sense of ethics and respect for privacy when working on confidential military contracts. An organization's human resources department is usually responsible for implementing proper employee background checks, especially for individuals accessing sensitive data (Taylor and Steele, 2018). Before hiring Jan, the organization conducted a background check and provided her with detailed training. According to Taylor and Steele (2018), granting trust involves a significant
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help