SlideShare a Scribd company logo
1 of 5
CSIA 300: Cybersecurity for Leaders and ManagersCase Study
#2: Data Security & Data Loss Prevention
Scenario
Congratulations on successfully completing your first briefing
paper for Padgett-Beale! The management interns did so well
that the Training Team has asked for your assistance in
developing a second training module. The topic for this
training module will be “Data Security and Data Loss
Prevention for Travelers.”
This training topic was selected after two Padgett-Beale
employees had sensitive corporate information and login
credentials stolen from their mobile devices while they were
traveling. One employee was traveling inside the United States.
The other employee was out of the office for two weeks on a
multi-country trip. In one case, it appears that the attackers
gained access to both a company cellphone and a company-
owned laptop. In the other, it appears that the active attack
affected an employee’s personal laptop while she was using
hotel provided Wi-Fi. This employee was using her personal
laptop because her company laptop was in checked baggage
(due to FAA and TSA restrictions) and was stolen while in the
airline’s baggage handling system.
Fortunately, neither person had stored or accessed customer
information from these devices. Both thefts were caught after
attackers tried to exploit the stolen login credentials and could
not get past the two-factor authentication requirement (security
code generated an authenticator application on the employee’s
corporate cell phone). During the after action reviews for these
incidents, a training gap and a technology gap were identified.
A policy gap, with respect to enforcing least privilege and
separation of duties was also identified as a potential area of
risk (too much access to sensitive data while traveling could
exacerbate the risks of data loss).
Your deliverable for this assignment will be a briefing paper
that identifies and discusses five or more major issues that
employees need to be aware of about this topic (Data Security
and Data Loss Prevention for Travelers). After you identify and
describe each security or privacy issue, include two to three
additional points that employees should know. Try to keep a
neutral tone, that is, you should focus on solutions not blame.
You should also address the importance of protecting both
personal and company owned devices and data while traveling.
After you address the issues, identify and discuss at least 5
recommended solutions (include at least one technology
solution and one policy solution). See the instructions below for
additional information about length, formatting, and citing of
sources.
Research
1. Review the Week 1, 2, and 3 readings.
2. Read these articles about security tips for business travel
(both US and foreign travel).
a. https://us.norton.com/internetsecurity-mobile-8-cyber-
security-tips-for-business-travelers.html
b. https://www.calyptix.com/top-threats/7-tips-data-security-
business-travelers/
c. http://www.redzonetech.net/blog/13-mobile-device-security-
tips-foreign-business-travelers-china/
d. https://edge.siriuscom.com/security/mobile-device-security-
in-the-workplace-5-key-risks-and-a-surprising-challenge
3. Research how a data loss prevention solution can help
prevent data thefts. Begin with these resources:
a. https://www.symantec.com/connect/articles/how-symantec-
data-loss-prevention-mobile-works-how-implement
b. https://sierraware.com/blog/?p=212
4. Research how two-factor authentication solutions can be used
to prevent data thefts by attackers who have stolen a person’s
login credentials. Begin with these resources:
a. https://docs.microsoft.com/en-us/azure/multi-factor-
authentication/end-user/microsoft-authenticator-app-how-to
b. https://www.google.com/landing/2step/
c. https://www.rsa.com/en-us/products/rsa-securid-suite/rsa-
securid-access/securid-software-tokens
5. Include in your discussion 3 or more additional technologies
that could be implemented to help prevent data thefts
originating from a business traveler’s mobile devices.
a. Virtual Private Network
b. Whole Disk Encryption
c. Mobile Device Management (including remote wipe for stolen
devices)
Write
Write a 2 page briefing paper in which you present a summary
of your research about the topic and your recommendations as
to what should be included in the training module. Be choosy
about what you include – the total training time available will
be 30 minutes. Don’t be too choosy however. Your
recommended content should be comprehensive and fully
address the training topic.
At a minimum, your briefing paper for this case study must
include the following:
1. An introduction to the case scenario and the topic (use the
information above)
2. An analysis of the security and privacy issues that includes
five or more key points about the topic (“data security and data
loss prevention”). Remember to stay focused on business
travelers and mobile devices (laptops, tablet computers, cell
phones, etc.)
3. Recommendations for 5 or more best practice based actions
that managers and employees should take to address the
identified security and privacy issues. Include at least one
recommendation for a technology based solution (e.g. VPN,
Mobile Device Management, Whole Disk Encryption, etc.)
Include at least one recommendation for a policy based
solution, i.e. implementing access controls based upon least
privilege and/or separation of duties.
4. A closing section in which you restate the key issues and
your recommendations.
As you write your briefing paper, make sure that you address
security issues using standard terms and definitions. See the
resources listed under Week 1 and under Course Resources >
Cybersecurity Concepts for definitions and terminology.
Submit For Grading
Submit your research paper in MS Word format (.docx or .doc
file) using the Case Study #1 Assignment in your assignment
folder. (Attach your file to the assignment entry.)
Additional Information
1. To save you time, a set of appropriate resources / reference
materials has been included as part of this assignment. You
must incorporate at least three of these resources into your final
deliverable. You must also include one resource that you found
on your own.
2. Your briefing paper should use standard terms and definitions
for cybersecurity. See Course Content > Cybersecurity Concepts
for recommended resources.
3. You must include a cover page with the assignment title, your
name, and the due date. Your reference list must be on a
separate page at the end of your file. These pages do not count
towards the assignment’s minimum page count. (An example
and template file are available in the LEO classroom. See
CSIA_Basic_Paper_Template(APA_6ed,Dec2018).docx file
under Content > Course Resources.)
4. Your briefing paper should be professional in appearance
with consistent use of fonts, font sizes, margins, etc. You
should use headings to organize your paper. The CSIA program
recommends that you follow standard APA formatting since this
will give you a document that meets the “professional
appearance” requirements. APA formatting guidelines and
examples are found under Course Resources.
5. You are expected to write grammatically correct English in
every assignment that you submit for grading. Do not turn in
any work without (a) using spell check, (b) using grammar
check, (c) verifying that your punctuation is correct and (d)
reviewing your work for correct word usage and correctly
structured sentences and paragraphs.
6. You are expected to credit your sources using in-text
citations and reference list entries. Both your citations and your
reference list entries must follow a consistent citation style
(APA, MLA, etc.).
Copyright ©2019 by University of Maryland University
College. All Rights Reserved

More Related Content

Similar to CSIA 300 Cybersecurity for Leaders and ManagersCase Study #2 Dat.docx

Term Paper The Rookie Chief Information Security OfficerThis assi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docxTerm Paper The Rookie Chief Information Security OfficerThis assi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docx
jacqueliner9
 
This assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxThis assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docx
gasciognecaren
 
AssignmentOutline of IT Solution and Next StepsYour ann.docx
AssignmentOutline of IT Solution and Next StepsYour ann.docxAssignmentOutline of IT Solution and Next StepsYour ann.docx
AssignmentOutline of IT Solution and Next StepsYour ann.docx
lascellesjaimie
 

Similar to CSIA 300 Cybersecurity for Leaders and ManagersCase Study #2 Dat.docx (10)

Strayer sec 420 week 9 web application attack scenario new
Strayer sec 420 week 9 web application attack scenario newStrayer sec 420 week 9 web application attack scenario new
Strayer sec 420 week 9 web application attack scenario new
 
Strayer sec 420 week 9 web application attack scenario new
Strayer sec 420 week 9 web application attack scenario newStrayer sec 420 week 9 web application attack scenario new
Strayer sec 420 week 9 web application attack scenario new
 
Assignment 2 critical infrastructure protection
Assignment 2 critical infrastructure protectionAssignment 2 critical infrastructure protection
Assignment 2 critical infrastructure protection
 
CIS 560 Education Specialist / snaptutorial.com
CIS 560 Education Specialist / snaptutorial.comCIS 560 Education Specialist / snaptutorial.com
CIS 560 Education Specialist / snaptutorial.com
 
Cis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.comCis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.com
 
Cis 438 Enthusiastic Study / snaptutorial.com
Cis 438 Enthusiastic Study / snaptutorial.comCis 438 Enthusiastic Study / snaptutorial.com
Cis 438 Enthusiastic Study / snaptutorial.com
 
Term Paper The Rookie Chief Information Security OfficerThis assi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docxTerm Paper The Rookie Chief Information Security OfficerThis assi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docx
 
Cis 560 Education Organization -- snaptutorial.com
Cis 560   Education Organization -- snaptutorial.comCis 560   Education Organization -- snaptutorial.com
Cis 560 Education Organization -- snaptutorial.com
 
This assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxThis assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docx
 
AssignmentOutline of IT Solution and Next StepsYour ann.docx
AssignmentOutline of IT Solution and Next StepsYour ann.docxAssignmentOutline of IT Solution and Next StepsYour ann.docx
AssignmentOutline of IT Solution and Next StepsYour ann.docx
 

More from mydrynan

CSIA 413 Cybersecurity Policy, Plans, and Programs.docx
CSIA 413 Cybersecurity Policy, Plans, and Programs.docxCSIA 413 Cybersecurity Policy, Plans, and Programs.docx
CSIA 413 Cybersecurity Policy, Plans, and Programs.docx
mydrynan
 
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docxCSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
mydrynan
 
CSI Paper Grading Rubric- (worth a possible 100 points) .docx
CSI Paper Grading Rubric- (worth a possible 100 points)   .docxCSI Paper Grading Rubric- (worth a possible 100 points)   .docx
CSI Paper Grading Rubric- (worth a possible 100 points) .docx
mydrynan
 
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docxCSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
mydrynan
 
CSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docx
CSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docxCSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docx
CSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docx
mydrynan
 
CSE422 Section 002 – Computer Networking Fall 2018 Ho.docx
CSE422 Section 002 – Computer Networking Fall 2018  Ho.docxCSE422 Section 002 – Computer Networking Fall 2018  Ho.docx
CSE422 Section 002 – Computer Networking Fall 2018 Ho.docx
mydrynan
 
CSCI  132  Practical  Unix  and  Programming   .docx
CSCI  132  Practical  Unix  and  Programming   .docxCSCI  132  Practical  Unix  and  Programming   .docx
CSCI  132  Practical  Unix  and  Programming   .docx
mydrynan
 
CSCI 714 Software Project Planning and EstimationLec.docx
CSCI 714 Software Project Planning and EstimationLec.docxCSCI 714 Software Project Planning and EstimationLec.docx
CSCI 714 Software Project Planning and EstimationLec.docx
mydrynan
 
CSCI 561Research Paper Topic Proposal and Outline Instructions.docx
CSCI 561Research Paper Topic Proposal and Outline Instructions.docxCSCI 561Research Paper Topic Proposal and Outline Instructions.docx
CSCI 561Research Paper Topic Proposal and Outline Instructions.docx
mydrynan
 
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docxCSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
mydrynan
 
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docxCryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
mydrynan
 
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docxCSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
mydrynan
 
CSCE 1040 Homework 2 For this assignment we are going to .docx
CSCE 1040 Homework 2  For this assignment we are going to .docxCSCE 1040 Homework 2  For this assignment we are going to .docx
CSCE 1040 Homework 2 For this assignment we are going to .docx
mydrynan
 
CSCE509–Spring2019Assignment3updated01May19DU.docx
CSCE509–Spring2019Assignment3updated01May19DU.docxCSCE509–Spring2019Assignment3updated01May19DU.docx
CSCE509–Spring2019Assignment3updated01May19DU.docx
mydrynan
 
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docxCSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
mydrynan
 
CSCE 3110 Data Structures & Algorithms Summer 2019 1 of .docx
CSCE 3110 Data Structures & Algorithms Summer 2019   1 of .docxCSCE 3110 Data Structures & Algorithms Summer 2019   1 of .docx
CSCE 3110 Data Structures & Algorithms Summer 2019 1 of .docx
mydrynan
 
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docxCSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
mydrynan
 
CSC-321 Final Writing Assignment In this assignment, you .docx
CSC-321 Final Writing Assignment  In this assignment, you .docxCSC-321 Final Writing Assignment  In this assignment, you .docx
CSC-321 Final Writing Assignment In this assignment, you .docx
mydrynan
 
Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docx
mydrynan
 
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docxCSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
mydrynan
 

More from mydrynan (20)

CSIA 413 Cybersecurity Policy, Plans, and Programs.docx
CSIA 413 Cybersecurity Policy, Plans, and Programs.docxCSIA 413 Cybersecurity Policy, Plans, and Programs.docx
CSIA 413 Cybersecurity Policy, Plans, and Programs.docx
 
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docxCSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
 
CSI Paper Grading Rubric- (worth a possible 100 points) .docx
CSI Paper Grading Rubric- (worth a possible 100 points)   .docxCSI Paper Grading Rubric- (worth a possible 100 points)   .docx
CSI Paper Grading Rubric- (worth a possible 100 points) .docx
 
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docxCSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
 
CSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docx
CSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docxCSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docx
CSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docx
 
CSE422 Section 002 – Computer Networking Fall 2018 Ho.docx
CSE422 Section 002 – Computer Networking Fall 2018  Ho.docxCSE422 Section 002 – Computer Networking Fall 2018  Ho.docx
CSE422 Section 002 – Computer Networking Fall 2018 Ho.docx
 
CSCI  132  Practical  Unix  and  Programming   .docx
CSCI  132  Practical  Unix  and  Programming   .docxCSCI  132  Practical  Unix  and  Programming   .docx
CSCI  132  Practical  Unix  and  Programming   .docx
 
CSCI 714 Software Project Planning and EstimationLec.docx
CSCI 714 Software Project Planning and EstimationLec.docxCSCI 714 Software Project Planning and EstimationLec.docx
CSCI 714 Software Project Planning and EstimationLec.docx
 
CSCI 561Research Paper Topic Proposal and Outline Instructions.docx
CSCI 561Research Paper Topic Proposal and Outline Instructions.docxCSCI 561Research Paper Topic Proposal and Outline Instructions.docx
CSCI 561Research Paper Topic Proposal and Outline Instructions.docx
 
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docxCSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
 
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docxCryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
 
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docxCSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
 
CSCE 1040 Homework 2 For this assignment we are going to .docx
CSCE 1040 Homework 2  For this assignment we are going to .docxCSCE 1040 Homework 2  For this assignment we are going to .docx
CSCE 1040 Homework 2 For this assignment we are going to .docx
 
CSCE509–Spring2019Assignment3updated01May19DU.docx
CSCE509–Spring2019Assignment3updated01May19DU.docxCSCE509–Spring2019Assignment3updated01May19DU.docx
CSCE509–Spring2019Assignment3updated01May19DU.docx
 
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docxCSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
 
CSCE 3110 Data Structures & Algorithms Summer 2019 1 of .docx
CSCE 3110 Data Structures & Algorithms Summer 2019   1 of .docxCSCE 3110 Data Structures & Algorithms Summer 2019   1 of .docx
CSCE 3110 Data Structures & Algorithms Summer 2019 1 of .docx
 
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docxCSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
 
CSC-321 Final Writing Assignment In this assignment, you .docx
CSC-321 Final Writing Assignment  In this assignment, you .docxCSC-321 Final Writing Assignment  In this assignment, you .docx
CSC-321 Final Writing Assignment In this assignment, you .docx
 
Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docx
 
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docxCSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

CSIA 300 Cybersecurity for Leaders and ManagersCase Study #2 Dat.docx

  • 1. CSIA 300: Cybersecurity for Leaders and ManagersCase Study #2: Data Security & Data Loss Prevention Scenario Congratulations on successfully completing your first briefing paper for Padgett-Beale! The management interns did so well that the Training Team has asked for your assistance in developing a second training module. The topic for this training module will be “Data Security and Data Loss Prevention for Travelers.” This training topic was selected after two Padgett-Beale employees had sensitive corporate information and login credentials stolen from their mobile devices while they were traveling. One employee was traveling inside the United States. The other employee was out of the office for two weeks on a multi-country trip. In one case, it appears that the attackers gained access to both a company cellphone and a company- owned laptop. In the other, it appears that the active attack affected an employee’s personal laptop while she was using hotel provided Wi-Fi. This employee was using her personal laptop because her company laptop was in checked baggage (due to FAA and TSA restrictions) and was stolen while in the airline’s baggage handling system. Fortunately, neither person had stored or accessed customer information from these devices. Both thefts were caught after attackers tried to exploit the stolen login credentials and could not get past the two-factor authentication requirement (security code generated an authenticator application on the employee’s corporate cell phone). During the after action reviews for these incidents, a training gap and a technology gap were identified. A policy gap, with respect to enforcing least privilege and separation of duties was also identified as a potential area of risk (too much access to sensitive data while traveling could exacerbate the risks of data loss).
  • 2. Your deliverable for this assignment will be a briefing paper that identifies and discusses five or more major issues that employees need to be aware of about this topic (Data Security and Data Loss Prevention for Travelers). After you identify and describe each security or privacy issue, include two to three additional points that employees should know. Try to keep a neutral tone, that is, you should focus on solutions not blame. You should also address the importance of protecting both personal and company owned devices and data while traveling. After you address the issues, identify and discuss at least 5 recommended solutions (include at least one technology solution and one policy solution). See the instructions below for additional information about length, formatting, and citing of sources. Research 1. Review the Week 1, 2, and 3 readings. 2. Read these articles about security tips for business travel (both US and foreign travel). a. https://us.norton.com/internetsecurity-mobile-8-cyber- security-tips-for-business-travelers.html b. https://www.calyptix.com/top-threats/7-tips-data-security- business-travelers/ c. http://www.redzonetech.net/blog/13-mobile-device-security- tips-foreign-business-travelers-china/ d. https://edge.siriuscom.com/security/mobile-device-security- in-the-workplace-5-key-risks-and-a-surprising-challenge 3. Research how a data loss prevention solution can help prevent data thefts. Begin with these resources: a. https://www.symantec.com/connect/articles/how-symantec- data-loss-prevention-mobile-works-how-implement b. https://sierraware.com/blog/?p=212 4. Research how two-factor authentication solutions can be used to prevent data thefts by attackers who have stolen a person’s login credentials. Begin with these resources: a. https://docs.microsoft.com/en-us/azure/multi-factor-
  • 3. authentication/end-user/microsoft-authenticator-app-how-to b. https://www.google.com/landing/2step/ c. https://www.rsa.com/en-us/products/rsa-securid-suite/rsa- securid-access/securid-software-tokens 5. Include in your discussion 3 or more additional technologies that could be implemented to help prevent data thefts originating from a business traveler’s mobile devices. a. Virtual Private Network b. Whole Disk Encryption c. Mobile Device Management (including remote wipe for stolen devices) Write Write a 2 page briefing paper in which you present a summary of your research about the topic and your recommendations as to what should be included in the training module. Be choosy about what you include – the total training time available will be 30 minutes. Don’t be too choosy however. Your recommended content should be comprehensive and fully address the training topic. At a minimum, your briefing paper for this case study must include the following: 1. An introduction to the case scenario and the topic (use the information above) 2. An analysis of the security and privacy issues that includes five or more key points about the topic (“data security and data loss prevention”). Remember to stay focused on business travelers and mobile devices (laptops, tablet computers, cell phones, etc.) 3. Recommendations for 5 or more best practice based actions that managers and employees should take to address the identified security and privacy issues. Include at least one recommendation for a technology based solution (e.g. VPN, Mobile Device Management, Whole Disk Encryption, etc.) Include at least one recommendation for a policy based solution, i.e. implementing access controls based upon least
  • 4. privilege and/or separation of duties. 4. A closing section in which you restate the key issues and your recommendations. As you write your briefing paper, make sure that you address security issues using standard terms and definitions. See the resources listed under Week 1 and under Course Resources > Cybersecurity Concepts for definitions and terminology. Submit For Grading Submit your research paper in MS Word format (.docx or .doc file) using the Case Study #1 Assignment in your assignment folder. (Attach your file to the assignment entry.) Additional Information 1. To save you time, a set of appropriate resources / reference materials has been included as part of this assignment. You must incorporate at least three of these resources into your final deliverable. You must also include one resource that you found on your own. 2. Your briefing paper should use standard terms and definitions for cybersecurity. See Course Content > Cybersecurity Concepts for recommended resources. 3. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s minimum page count. (An example and template file are available in the LEO classroom. See CSIA_Basic_Paper_Template(APA_6ed,Dec2018).docx file under Content > Course Resources.) 4. Your briefing paper should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings to organize your paper. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and
  • 5. examples are found under Course Resources. 5. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. 6. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.). Copyright ©2019 by University of Maryland University College. All Rights Reserved