Security Gaps And Mitigations Scenario

Security Gaps And Mitigations Scenario
Security Gaps and Mitigations
You are the newly hired chief information officer (CIO) for Premier University, a public university with 30,000 students and approximately 5,000 faculty and staff members.
Premier University experienced a data breach approximately six months ago. During that breach, a laptop owned by the institution was stolen from a staff member’s car. The staff member worked in the institution’s financial aid office. The laptop was not password protected or encrypted, and data belonging to about 5,000 former students, including Social Security numbers (SSNs), name, and credit card information, was exposed.
Premier University did not have an incident response function at that time, so the university’s response to the breach was poor. After the staff member reported the stolen laptop to campus police, it took the institution almost 90 days to determine that personally identifiable data was stored on the device, and then another 30 days to inform affected individuals about the breach of their information.
The breach was reported in local news media, and the institution’s press representative could not answer the reporter’s questions about how students should protect themselves and their data following the breach. After the news report, many Premier University alumni complained to Premier’s president about the institution’s poor breach response. As a result, donations from alumni have dropped slightly.
You were hired after the breach to help the institution improve its information security program.
The Premier University president has asked you to outline potential gaps and weaknesses that lead to the data breach six months ago, and to identify potential improvements to overcome those gaps and weaknesses.
For this part of the project:
· Research the weaknesses indicated in the scenario and solutions other institutions have implemented to prevent them from occurring in the future.
· Create a professional report for the university president that addresses the following:
· The weaknesses you discovered about the data breach incident (as indicated in the scenario)
· Relevant mitigations for each weakness
· In the report, include any sources you consulted.
Submission Requirements
Format: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation Style: Follow your school’s preferred style guide
Length: 3 to 4 pages minimum
Self-Assessment Checklist
I researched weaknesses indicated in the scenario and solutions other institutions have implemented to prevent them from occurring in the future.
I addressed the weaknesses and relevant mitigations for each weakness.
I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
I followed the submission guidelines.

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 30% with the discount code HAPPY