Altamaha Tech Incorporated is a company that specializes in the development of wearable medical devices. The company has recently experienced a high turnover of design engineers and scientists. Understanding the current situation, the company held a meeting on what steps can be taken to improve operations and secure its information and information systems. The company’s initial concern would focus on the possibility of internal and external threats due to the high turnover of key employees. To aid the company in developing security controls that address known issues, the company has completed a security audit by a trusted third party. The independent security report has detailed information on all issues found within the security program.
You will assume the role of the CTO (Chief Technology Officer) to review the attached security reportLinks to an external site. (PDF) to develop proposed security improvements. You must determine the appropriate actions based on industry standards and best practices to create a plan to resolve security issues.
Describe assessment techniques used to determine threats and vulnerabilities.
Describe physical security threats and vulnerabilities.
Describe logical (technical) security threats and vulnerabilities.
Summarize required policies to protect information systems:
Acceptable Use Policy (AUP)
Mobiles Device Management (MDM)
Personally identifiable information (PII)
Payment Card Industry Data Security Standard (PCI DSS)
Information system secure backup strategies
Describe policies and procedures used for continuous security monitoring.
Describe training and continuing education policies implementation.
Altamaha Tech Incorporated Security Improvement Plan
CTO Review of Security Report
I have reviewed the security report provided by the trusted third party, and I have identified the following areas where Altamaha Tech Incorporated can improve its security posture:
Altamaha Tech Incorporated should use a variety of assessment techniques to determine threats and vulnerabilities, including:
* **Vulnerability scanning:** Vulnerability scanners can be used to identify known vulnerabilities in software and hardware.
* **Penetration testing:** Penetration testing involves simulating an attack on a system to identify security weaknesses.
* **Risk assessments:** Risk assessments can be used to identify and prioritize the risks to Altamaha Tech Incorporated’s information and information systems.
Altamaha Tech Incorporated should be aware of the following physical security threats and vulnerabilities:
* **Unauthorized access:** Unauthorized individuals may attempt to gain access to Altamaha Tech Incorporated’s facilities or information systems.
* **Theft:** Equipment and data may be stolen from Altamaha Tech Incorporated’s facilities.
* **Damage:** Altamaha Tech Incorporated’s facilities or information systems may be damaged by natural disasters or accidents.
Altamaha Tech Incorporated should be aware of the following logical (technical) security threats and vulnerabilities:
* **Malware:** Malware is malicious software that can damage or disable computers and networks.
* **Phishing:** Phishing attacks involve sending fraudulent emails or text messages that attempt to trick users into revealing confidential information.
* **Denial-of-service attacks:** Denial-of-service attacks attempt to overwhelm a system with traffic, making it unavailable to legitimate users.
Required policies to protect information systems:
Policies and procedures used for continuous security monitoring:
Training and continuing education policies implementation:
Security Improvement Plan
Based on the findings of the security report, I recommend the following security improvements:
These are just a few of the security improvements that Altamaha Tech Incorporated can implement. The company should develop a security plan that is tailored to its specific needs and risks.