Order for this Paper or similar Assignment Help Service

Fill the order form in 3 easy steps - Less than 5 mins.

Posted: November 24th, 2022

9142

All posts must be (2) substantive responses with a minimum of 150 words each for Responses 1 and 2. Ensure you list and break down each response in a word document, along with its reference. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

Policy and procedures that are in place organization wide always need to be checked for effectiveness and to ensure staff are following the appropriate methods and procedures. This checks and balance system can be done with regular audits, log auditing, as well as recording and auditing phone conversations. These logs will check for inconsistencies in the network and in the actions performed by the staff, and the audits will check to ensure staff are acting on policy in real time with walk throughs of the facility and phone conversations with customers. Training is also a vital part of ensuring these measures take effect, once training is complete a survey can be put out to measure the understanding of the policy. Along with walk throughs in the organization a security officer or a hired security specialist can complete social engineering exercises to test the staff. These tests can and should be random to ensure that staff are following procedure as prescribed. Taking note of all of these methods and what staff seem to have trouble grasping is important because these issues will need to be revisited in training and possibly one on one training. The test phishing emails can also be set up to alert the security team of all persons who click on the links in the email and also the staff that forward it to others. It should also be calculated how many staff alert the security team of the email or of any security problem they are unsure about.

Kizza, J. M. (2009). Guide to computer network security (pp. 2007-2008). London: Springer.

-AMANDA

REFERENCE 2:

To evaluate the effectiveness of the social engineering policies put in place for the Bank of the Great Danes (BGD), there are a few things I will check on to make sure they were carried out. I hired Iron Mountain to provide confidential paper recycling bins that will place trash canisters throughout the facility for ease of access to all employees. I have sent out electronic reminders informing employees to use the proper reciprocals for sensitive data and not regular trash cans (Mitnick, 2021). I have been created a team to randomly go around and check employee’s personal small trash bins to ensure sensitive documents are not found in them. I have even personally observed the outside public dumpsters to verify no sensitive paperwork is found, and so far I have not found any more sensitive documents.

When outside IT or other facilities repair workers are hired to come to service various things within BGD, I have been observing how this has been handled. I have placed a surveillance camera and a required signature log in the front lobby and have been reviewing the footage (Washo, 2021). When someone comes in, previously we would willing to let them in as long as they knew what issue was being fixed and mentioned who sent them. Now when they come in management is sent upfront to verify the company is legit and if all is clear that manager has to sign the sheet for documentation.

Last week we had an intruder who claimed he was there to fix the intermittent internet connection BGD has been experiencing. The thing was one of the managers had posted on Facebook “they were glad the intermittent internet issues at work would soon be resolved”. The intruder claimed the manager who posted the post had sent him, however, the actual crew of workers was not to come until the following day. The intruder event used a different company name. So far the social engineering implementations are working for BGD.

Mitnick, S. (2021, April 5). 6 types of social engineering attacks. Retrieved January 09, 2022, from https://www.mitnicksecurity.com/blog/6-types-of-social-engineering-attacks

Washo, A. (2021, July 25). An interdisciplinary view of social engineering: A call to action for research. Retrieved January 09, 2022, from https://www.sciencedirect.com/science/article/pii/S2451958821000749

– ROBERTO

v For Responses 1 and 2, all posts must be (2) substantive responses with a minimum of 150 words each. Ensure that each response is listed and broken down in a word document, along with its citation. The response should expand on the topic or provide additional information. The discussion post that discusses the responses can be found below to help you better comprehend the response. Original work with no plagiarized material. It is necessary to meet the deadline.

FIRST RESPONSE:

Policy and procedures that are in place across the organization should be reviewed on a regular basis to verify that they are effective and that employees are following the correct methods and processes. Regular audits, log auditing, and recording and auditing phone conversations can all be used to create a checks and balances system. These logs will look for certain things.

Order | Check Discount

Tags: APN nursing help, assignment help online free help with assignment online, assignment help website, best website for nursing assignment, college homework help websites, DNP nursing help

Assignment Help For You!

Special Offer! Get 20-30% Off on Every Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the finest writers are selected to be a part of our team, with each possessing specialized knowledge in specific subjects and a background in academic writing..

Affordable Prices

We balance affordability with exceptional writing standards by offering student-friendly prices that are competitive and reasonable compared to other writing services.

100% Plagiarism-Free

We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you opt to place an order with Nursing StudyBay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We assess your order and pair it with a custom writer who possesses the specific qualifications for that subject. They then start the research/write from scratch.

Order in Progress and Delivery

You and the assigned writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also peruse testimonials from other clients. From several options, you can select your preferred writer.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00