Share
Explore BrainMass

What techniques can be used to prevent unauthorized access t

What techniques can be used to prevent unauthorized access to the company's information system resources?

How can successful and unsuccessful attempts to compromise the company's systems controls be detected in a timely manner?

What steps can management take to be prepared to effectively respond to security incidents?

Justify your answers using appropriate reasoning and examples. Comment on the postings of at least two of your peers.

Solution Preview

What techniques can be used to prevent unauthorized access to the company's information system resources?

- In this area, the most basic controls are generally the most effective. Management should be instructed on the proper protocol when it comes to password setting, and should be reminded to never share their password. The company should enforce that they will act upon situations if and when it is discovered that management has acted against the expected protocol. Management should only have access to the areas that are necessary. Not all managers or other individuals should be given access to all areas solely because they are management. There should be an actual need for management to have access to their respective areas. Those who do have access ...

Solution Summary

What techniques can be used to prevent unauthorized access to the company's information system resources?

How can successful and unsuccessful attempts to compromise the company's systems controls be detected in a timely manner?

What steps can management take to be prepared to effectively respond to security incidents?

Justify your answers using appropriate reasoning and examples. Comment on the postings of at least two of your peers.

$2.19