IT STRATEGIC SOLUTIONS

SCENARIO
AEnergy Company has some security policies established (See Appendix at end of Case Study). However, there have been some incidents that have created doubt about the effectiveness of the protections offered by the current policies. For example, an employee’s laptop computer was recently stolen at the airport while the employee was traveling on company business. Management has asked you to analyze the company systems and update the policies as necessary so the company is protected from potential threats from both external parties and internal users of the company technology.

A. Evaluate the effectiveness of AEnergy Company’s security policies (see the attached “AEnergy Data Security Policy,” “AEnergy Employer Security Policy,” and “AEnergyy Accounting Security Policy”) in regard to ethical issues.

  1. Discuss two potential unethical uses of the company technology and/or data by internal users.
  2. Discuss two potential unethical uses of the company technology and/or data by external parties.

B. Evaluate the effectiveness of AEnergy Company’s security policies (see the attached “AEnergy Data Security Policy,” “AEnergy Employer Security Policy,” and “AEnergy Accounting Security Policy”) in regard to security threats.

  1. Discuss two potential security threats to the company technology and/or data from internal users.
  2. Discuss two potential security threats to the company technology and/or data from external parties.

C. Create updated company policies that outline expectations related to use of company technologies by internal users and issues with external parties.

  1. Explain how your changes would mitigate the unethical uses discussed in parts A1 and A2.
  2. Explain how your changes would mitigate the security threats discussed in parts B1 and B2.

Sample Solution

ACED ESSAYS