Part 3 Flashcards
TEN STEPS TO BUILDING A SECURE ORGANIZATION
Having identified some of the challenges to building a secure organization, let’s now look at 10 ways to successfully build a secure organization.
The following steps will put a business in a robust
____
security posture.
Evaluate the ____
Risks and Threats
Another approach is to begin by evaluating the ____.
threats posed to your organization and your data
Threats Based on the Infrastructure Model
The first place to start is to ____ based on an organization’s infrastructure model.
identify risks
What ____ is in place that is necessary to support the operational needs of the business?
infrastructure
A small business that operates out of one office has ___ as opposed to an organization that operates out of numerous facilities, includes a mobile workforce utilizing a variety of handheld devices, and offers products or services through a Web-based interface.
reduced risks
An organization that has a large number of telecommuters must take steps to protect its ____ that could potentially reside on personally owned computers outside company control.
proprietary information
An organization that has widely dispersed and disparate systems will have more ____ than a centrally located one that utilizes uniform systems.
risk potential
Threats Based on ____
Are there any specific threats for your particular business?
the Business Itself
Threats Based on ____
Businesses belonging to particular industries are targeted more frequently and with more dedication than those in other industries.
Industry
Financial institutions and online retail- ers are targeted because ____
“that’s where the money is.”
Pharmaceutical manufacturers could be targeted to steal ____, but they also could be targeted by special interest groups, such as those that do not believe in testing drugs on live animals.
intellectual property
Global Threats
Businesses are often so narrowly focused on their local sphere of influence that they forget that by having a network connected to the Internet, they are now ____
connected to the rest of the world.
If a piece of malware identified on the other side of the globe targets the ____ used in your organization, you can be sure that you will eventually be impacted by this malware.
identical software
Once threats and risks are identified, you can take one of four steps:
Ignore the risk. This is never an acceptable response. This is simply burying your head in the sand and hoping the problem will go away—the business equivalent of _____
not wearing a helmet when riding a motorcycle.