Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Online interactions pose a threat to all servers

Online interactions pose a threat to all servers

Writing

Online interactions pose a threat to all servers. There are risks that occur when employees use social networking, web browsing, and email. Playbooks typically cover a section related to threats and defenses of online interactions.

In this next section of your playbook, outline steps to take when an employee reports clicking on a website that appeared in an email that was received.

Include the following information in this section:

  • Descriptions of two threats this interaction poses on the company
  • Step-by-step instructions on how to mitigate each interaction

Note: Numbered or bulleted steps/guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps/guidelines.

Cite at least two resources within the assignment in APA format.

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

Answer:

Online interactions pose a threat to all servers. There are risks that occur when employees use so( networking, web browsing, and email. Playbooks typically cover a section related to threats and defenses of online interactions. 

In this next section of your playbook, outline steps to take when an employee reports clicking on a website that appeared in an email that was received. 

Include the following information in this section: Descriptions of two threats this interaction poses on the company Step-by-step instructions on how to mitigate each interaction 

Step-by-Step explanation

Threats poses to company while online interactions are as follow :

1. Loss of IP and Sensitive Data : Here sometimes companies ideas, inventions and creativity are

robbed by Injecting hacking IP as a result those sensitve

data are lost, which may lead to huge loss to growth and prospect of the companies.  

2. Competitive Risk : Sometimes there is a chance that competitive forces are preventing us to achieve a goal,

usually associated with the risk of declining business by revenue or margins due to the actions of a competitor.

for example: In the COVID-19, you will find service based it comapnies,manufacturing industries and semi medium industries

are worstly affected.

Step-by-step instructions to mitigate each interaction :

1.Loss of IP and Sensitive Data :

a.) Lay out the Intellectual Property and Trade Secret Protection.

b.) Identify the Most Valuable Data Assets,

c.) Once it is Identified, We must Protect those Assets.

d.) We must adopt a Criminal Mind,here it refers to positivity, as there is quote 'Iron cuts Iron',

same as hackers can be prvented if we are better hacker than them.

e.) Improve Employee Awareness.

f.) Invest in a Strong Data Protection Solution.

2. Competitive Risk

a.) Know Position of strengths to weaknesses: alway focus on best product delivery.

b.) Stay lean: If we stay lean, we can maximizing value and minimizing waste

c.) Go after large clients: try to go after the large client in order to maximize profit

d.) Know your numbers: try to know your numbers.