Info Security Assi.
Info Security Assi.
QUESTION
You are a security officer working for a medium-sized research company. You have been
assigned to guard the facility. Two incidents occur. The first, a well-known manager walks out
with a box of papers. The second, someone believed to be an outsider assesses the company
information and goes away with the company blue prints for the next generation product.
Briefly list all security gaps, vulnerabilities, threats, risks, and exploits.
Describe how these incidents can be overcome.
SOLUTION
1 . SECURITY GAPS
The first incident involved a well-known director leaving with a case of papers, showing that
there were no real security measures in place and no procedures for obtaining confidential
information.
2. VULNERABILITIES
The second incident, in which a third party gained access to company data and designs, shows
that there are no access controls in place, such as reliable confirmation and approval
procedures.
3. THREATS
The first incident also emphasizes the danger of insider threats, where workers with
authorized access to sensitive information may purposefully or accidentally abuse or steal it.
An external threat, such as an unauthorized person breaking into the website and obtaining
access to valuable information and resources.
Physical theft, such as robbing someone of tangible assets like highly classified documents or
machinery.
4. RISKS
Theft or loss of assets containing sensitive information that harms the company's profits or
reputation.
Violations of the law and rules, include failing to secure personal data and data breaches.
5. EXPLOITS
In the case of the first incident , physical theft, such as robbing someone of tangible assets
like highly classified documents or machinery.
In the case of the first incident , theft and improper use of sensitive data in the case of the
second event, which is an example of information exploitation.