Assignment title: Management


Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure. Define an auditing plan which includes: ? scope ? benchmarks ? data-collection ? post-audit activities ? log management ? testing of security systems Select three of the following end-user breaches for your assignment: ? Open network drive shares allow storage privileges to outside users. ? Sensitive laptop data is unencrypted and susceptible to physical theft. ? Remote users do not have recent patches or current updates. ? Removable storage drives introduce malware filtered only when crossing the network. ? Predictable passwords meet minimum length requirements but remain easily guessable