Reading: Rayome, A. D. N. (2017, August 2). Why ex-employees may be your company’s biggest cyberthreat(Links to an external site.). Tech Republic.
Read the two cases:
Department of Justice (2021, August 16). Florida Woman Convicted Of Damaging Her Former Employer’s Computers After She Was Fired, https://www.justice.gov/usao-sdny/pr/florida-woman-convicted-damaging-her-former-employer-s-computers-after-she-was-fired(Links to an external site.).
Gatlan, S. (2021, September 1). Fired NY credit union employee nukes 21GB of data in revenge. https://www.bleepingcomputer.com/news/security/fired-ny-credit-union-employee-nukes-21gb-of-data-in-revenge/(Links to an external site.) .
Answer the following questions.
How does personnel security relate to the security of information systems?
What are some of the reasons companies continue to, unintentionally or otherwise, have ex-employees maintain access to sensitive systems?
For the two cases you just read, how can the organizations ensure that their employees, especially the ones were terminated through involuntary separation, will not misuse access to sensitive data such as credit card information, health records, intellectual property, etc.?
Any additional thoughts or recommendations regarding insider threat mitigation or control?
Include three(3) references in addition to the above readings. Both in-text citations and bibliography should be in the APA format.
Recent Comments