Home » Downloads » Describe a type of mistake that a user can make and what could be done to prevent it

Describe a type of mistake that a user can make and what could be done to prevent it

Describe a type of mistake that a user can make and what could be done to prevent it

Read the article below.  Describe a type of mistake that a user can make and what could be done to prevent it.  Be specific and creative and don’t repeat what someone else stated.

–Employee Mistakes Undermine US Government Data Security
(November 10, 2014)
According to an Associated Press analysis of information obtained
through Freedom of Information Act (FOIA) requests, at least half of US
government IT security incidents are the result of mistakes made by
workers. Employees have violated workplace policies; lost or had stolen
devices containing sensitive information; and shared sensitive
information.

[Editor’s Note (Pescatore): The numbers aren’t tremendously different
for private industry; if anything, employee error is responsible for a
higher percentage of incidents. Attacker-driven breaches get the press
coverage, but errors by well-meaning insiders (both users and sys
admins) both directly cause a high percentage of breaches and are the
root cause of enabling many external attacker breaches, as well. The
dreaded “email address autocomplete leads to spreadsheet with sensitive
information being sent to competitor/world” error is a common example
of the former, “OK, I’ll spin up www25.acme.com just for tonight for
you on the DMZ” is an example of the latter.
(Murray): This is no more likely to be true in the US Government than
in any other organization. Even in the unlikely event that we were to
solve all of our software quality problems, we would still be vulnerable
to errors and omissions by otherwise well motivated but gratuitously
privileged users. “The dummies have it, hands down, now and forever.”
– –Robert H. Courtney.  Such errors should be resisted by application
design, training, supervision, multi-party controls, and automatic
confirmations.  Management should recognize and reward timely detection
and correction of errors.]

 

…………………..Answer preview………………..

Users like employees may have access to devices that contain sensitive information and share to unauthorized parties. It could result to data theft. Employees could also share such sensitive information to competitors which may make the business vulnerable to competition…………………………………………..

APA

340 words

Get instant access to the full solution from yourhomeworksolutions by clicking the purchase button below

ABOUT

Yourhomeworksolutions is a one-stop shop for all your homework needs. You can purchase already completed solutions to be used as samples and you can order assignments to be done afresh by our competent writers.