AEnergy Company has some security policies established (See Appendix at end of Case Study). However, there have been some incidents that have created doubt about the effectiveness of the protections offered by the current policies. For example, an employee’s laptop computer was recently stolen at the airport while the employee was traveling on company business. Management has asked you to analyze the company systems and update the policies as necessary so the company is protected from potential threats from both external parties and internal users of the company technology.
A. Evaluate the effectiveness of AEnergy Company’s security policies (see the attached “AEnergy Data Security Policy,” “AEnergy Employer Security Policy,” and “AEnergyy Accounting Security Policy”) in regard to ethical issues.
- Discuss two potential unethical uses of the company technology and/or data by internal users.
- Discuss two potential unethical uses of the company technology and/or data by external parties.
B. Evaluate the effectiveness of AEnergy Company’s security policies (see the attached “AEnergy Data Security Policy,” “AEnergy Employer Security Policy,” and “AEnergy Accounting Security Policy”) in regard to security threats.
- Discuss two potential security threats to the company technology and/or data from internal users.
- Discuss two potential security threats to the company technology and/or data from external parties.
C. Create updated company policies that outline expectations related to use of company technologies by internal users and issues with external parties.
- Explain how your changes would mitigate the unethical uses discussed in parts A1 and A2.
- Explain how your changes would mitigate the security threats discussed in parts B1 and B2.
aults in programming frameworks keep on being a significant issues. A product bug is a blunder, disappointment, imperfection, shortcoming or mix-up in a PC program that oppose it from carrying on as proposed, such as creating an off base outcome. A product deficiency is an imperfection that causes programming disappointment in an executable item. Realizing the reasons for potential deformities just as distinguishing general programming process territories that may require consideration from the introduction of a venture could set aside cash, time and work. The plausibility of earlier assessing the potential defectiveness of programming could help on arranging, controlling and executing programming advancement exercises. Programming without a mistake is hard to grow, for the most part there are some obscure bugs or unanticipated inadequacies even in programming ventures where the standards of the product improvement techniques were applied carefully. On account of scarcely any product modules that are inadequate the upkeep period of programming ventures could turn out to be extremely difficult for the clients and expensive for the associations. Thus, it is exceptionally vital to foresee the flawed modules or documents in a product framework prior to extend arrangement, in light of the fact that because of this forecast of blunder we can diminish cost of venture, so the general achievement pace of programming is expanded. Deformity expectation will give one progressively opportunity to the improvement group to test again the modules or documents for which the imperfection likelihood is low. 5.2 Development did>GET ANSWER