Explore BrainMass

Prevention of Breach of Organizational Information

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

•Select any three of the following security threats described in the textbook (human error, damage by employees, misuse of computer systems, theft, computer-based fraud, viruses, hackers, and natural disasters) and recommend a control for each threat that can be put into place to mitigate the breach of organizational information. Be sure to provide specific examples to support your response. Rank the threats in order of risk and then justify your ranking.

© BrainMass Inc. brainmass.com October 25, 2018, 9:12 am ad1c9bdddf

Solution Preview

As a suggestion, you can rank the three threats as 1.) Hackers, 2.) Computer-based fraud and 3.) Human error.
Hacking is ranked first because it is considered as a silent theft and it can only be discovered after the damage is done. Perpetrators can do it within outside the vicinity of the establishment where the information is located. Computer-based fraud is ranked second because this can only possibly done with somebody within the organization and with access to the organization's information system. Human error is the least of them since it is not deliberately done.

Preventing Hacking:
Primarily, do not allow unauthorized person from accessing your computer system.
Hacking can be prevented by improving computer security. ...

Solution Summary

Protecting organizational information is vital in every organization. Preventing information breach can save the organization's resources and prestige.

See Also This Related BrainMass Solution

Security for customer data; fraud detection, forensic accounting

Write a paper in which you:

1) Evaluate the obligation Flayton Electronics has to its customers to protect their private data.
2) If you were the CEO, develop the communication strategy you would take to notify the customers of the potential security breach.
3) Determine the extent to which Flayton Electronics' brand was damaged by the security breach.
4) Recommend procedures that Flayton Electronics should take to prevent future security breaches.

Your assignment must:

Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

The specific course learning outcomes associated with this assignment are:

Analyze the processes related to fraud detection, including the responsibilities of management and auditors, assessing the organizational environment, and detecting and investigating fraudulent activity.

Use technology and information resources to research issues in forensic accounting.

Write clearly and concisely about forensic accounting issues using proper writing mechanics.

View Full Posting Details