Identify safeguards that should be implemented to protect against attacks by malicious insiders
There are several steps organizations can take to reduce the potential for attacks from insiders, including the following:
• Perform a thorough background check as well as psychological and drug testing of candidates for
sensitive positions.
• Establish an expectation of regular and ongoing psychological and drug testing as a normal routine for
people in sensitive positions.
• Carefully limit the number of people who can perform sensitive operations, and grant only the minimum
rights and privileges necessary to perform essential duties.
• Define job roles and procedures so it is not possible for the same person to both initiate and approve an
action.
• Periodically rotate employees in sensitive positions so that any unusual procedures can be detected by
the replacement.
• Immediately revoke all rights and privileges required to perform old job responsibilities when someone
in a sensitive position moves to a new position.
• Implement an ongoing audit process to review key actions and procedures.
?
You might also like to view...
The loss of usefulness because of deterioration from age and from wear is called
a. functional depreciation; b. physical depreciation; c. technological depreciation; d. amortization; e. depletion.
Which of the following is least effective while searching for anomalies?
a. Comparing account balances in the statements from one period to the next. b. Calculating key ratios and comparing them from one period to the next. c. Performing horizontal analysis. d. Performing vertical analysis.
Apple combines and packages proven technology in new and innovative ways. This is an example of its use of
A. strong primary activities. B. tangible resources. C. intangible resources. D. organizational capabilities.
A continuous random variable X has the following probability density function: f(x) = 1/4, 0 ? x ? 4 Find the following probabilities:
a. P(X ? 1) b. P(X ? 2) c. P(1 ? X ? 2) d. P(X = 3)