Unit 5 Discussion 1

.docx

School

Purdue Global University *

*We aren’t endorsed by this school

Course

497

Subject

Sociology

Date

Feb 20, 2024

Type

docx

Pages

2

Uploaded by SargentSnow10139

Report
Hi Everyone, Obviously, over the course of this degree we have learned that policy is large which it is based. We have seen security breaches happen with several large corporations in the last 10 years that have proven the need for policy. I recently was affected by a DDOS attack on servers of a game I play when I am relaxing. Exploitations are always being found and amazingly some of the old methods are still the most effective. We all know who Kevin Mitnick is by now. He was a master of deceiving human beings by using perception as a key tool to attack systems and was very effective. We also know that this is the definition of social engineering as well. In the Public Sector scenario in chapter 13 it is said that a phishing attack was how access to they system was gained. This just happened with an employee’s e-mails at work as well, which led to the eventual loss of his entire e-mail. South Carolina’s policy had some obvious flaws if there was this big of a breach. If best practice were implemented for their policies it could have prevented this situation entirely. How? Just wrote discussions last week on how QA and QC along with strong implementation help to improve and strengthen a product by constantly assessing and re- evaluating what is working and what is not. You could say this is practicing due diligence is the idea behind QA and QC, it just helps to put a process for due diligence. Network assessments would have had to be necessary for South Carolina to prevent this from happening at all. Second, it is best practice in network security to train your employees on current threats and what to look for, if they are put in these situations (securitymetrics.com, 2023). I personally cannot stress this enough as it seems as though the general population is under trained and do not understand what they are facing when they are on their respective organizations network. Lastly, it states in the book that policies were weak and not adequate or consistent (Johnson, 2015). Strong policy means that policies are consistent and followed through by the employees and management who use the system. This includes repercussions for violations and training on what the policies are along, with agreements such as AUP’s and what to do in the event of complex situations. If the policies are weak and inconsistent you will see breaches such as this happen. References: securitymetrics.com. (2023, July 19). How to train your workforce on social engineering . SecurityMetrics. https://www.securitymetrics.com/learn/how-train-your-workforce-social- engineering Johnson, R. (2015). 13. In Security policies and implementation issues ; Second edition . essay, Jones and Bartlett Learning.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help