Describe assessment techniques used to determine threats and vulnerabilities.

Scenario

Altamaha Tech Incorporated is a company that specializes in the development of wearable medical devices. The company has recently experienced high turnover of design engineers and scientists. Understanding the current situation, the company held a meeting on what steps can be taken to improve operations and secure its information and information systems. The company’s initial concern would focus on the possibility of internal and external threat due to high turnover of key employees. To aid the company in developing security controls that address known issues, the company has completed a security audit by a trusted third party. The independent security report has detailed information on all issues found within the security program.

You will assume the role as the CTO (Chief Technology Officer) to review the attached security report (Links to an external site.) (PDF) to develop proposed security improvements. You must determine the appropriate actions based on industry standards and best practices to create a plan to resolve security issues.

Instructions

Write your paper in the MLA format.

  1. Describe assessment techniques used to determine threats and vulnerabilities.
  2. Describe physical security threats and vulnerabilities.
  3. Describe logical (technical) security threats and vulnerabilities.
  4. Summarize required policies to protect information systems:
    •Acceptable Use Policy (AUP)
    •Mobiles device Management (MDM)
    •Personally identifiable information (PII)
    •Payment Card Industry Data Security Standard (PCI DSS)
    •Information system secure backup strategies
  5. Describe policies and procedures used for continuous security monitoring.
  6. Describe training and continuing education policies implementation.
  7. Describe a continuity of operations plan to keep the key system operational during a disaster.