MANAGING SECURED ENVIRONMENTS Assignment, MU, Malaysia A successful threat management strategy can reduce the risk posed by a person of concern, prevent an insider incident
University | Mahsa University (MU) |
Subject | MANAGING SECURED ENVIRONMENTS |
Surveys indicate that many workers are reluctant to report unethical practices, including stealing in the workplace. Although a law was passed to counter unethical corporate behavior and protect workers who report unethical activities, many employees still face the loss of their jobs or ridicule if they blow the whistle on corporate misconduct(Spherion, 2006)
Further, it has been reported that nearly 25% percent of young workers aged 18 to 24 do not believe that stealing office supplies for personal use is wrong. Many steal employer property, including pens, pencils, paper, self-adhesive notepads, and paper clips without regard to the activity’s illegality.
Employee theft costs American businesses over $40 billion each year.(Wulfhorst, 2006) Unethical behavior, dishonesty, and theft in the workplace often occur in a gradual incremental process. Theft, in particular, stems from a complex set of causes. Foremost among them is simply that an opportunity to steal arises, because chances of getting caught are low.
Additional causes include low workforce morale, employees’ sense that they are being underpaid and minimal consequences for getting caught stealing(Walsh, 2000)
As seemingly insignificant misconduct and theft go undetected, perpetrators often rationalize larger transgressions. Even high-level executives can become tempted to steal. Consider Dale Frantz, the former chief information officer of Auto Warehousing Company.
Frantz embezzled more than $500,000 from his company during 2007-2009 and was sentenced to nearly 6 years in prison. He used a number of strategies to steal the funds, including writing up fraudulent invoices for expense reports and changing legitimate reports to maximize his reimbursements. In addition, he used company funds to buy computer equipment that he resold on the Internet.
Instruction :
Discuss in a group the following questions
Question :
A successful threat management strategy can reduce the risk posed by a person of concern, prevent an insider incident, and protect the organization and its people. As a team in security department, you are required to build an insider threat mitigation programfor your company.
- Plan(Prevent insider threat)
- Management responsibility
- Establish goals/objective
- Organize and equipment(physical security)
- Detecting and identifying insider threats
- Threat management team
- Assess insider threats
- Trainand execute
- Suggest ways to execute the plan
- Eg : training for employees
- Evaluation and Improvement
- Audit–once a year
- Compliance–ways to make sure ur staff follow ur plan/procedure?
Get Solution of this Assessment. Hire Experts to solve this assignment for you Before Deadline.
Get Help By Expert
Struggling with your secured environments assignment? Seek no further! Assignment Helper MY offers comprehensive online assignment assistance designed specifically for Mahsa University (MU) students. Our dedicated team of experts is committed to delivering exceptional results through our reliable "Do My Assignment" service. With our deep understanding and expertise in managing secured environments, we provide customized assignments that meet the highest academic standards.
Recent Solved Questions
- Certified Financial Planner Assignment, UTAR, Malaysia Some weeks ago, you (Danny Lim) a Certified Financial Planner (CFP) and a licensed Financial Planner met your old friend
- As the Chief Financial Officer (CFO) of a public listed company (property sector) in Bursa Malaysia, you are evaluating an investment opportunity in a new project in Cyberjaya, Selangor: Corporate finance, Assignment, Malaysia
- BFI3313: Choose ONE (1) financial institution from the banking industry that operates in Malaysia: FINANCIAL AND MONETARY SYSTEMS Assignment, QIU, Malaysia
- AICT004-3-2-NWN: Networks and Networking Assignment, APU, Malaysia You are required to design and apply an IP addressing scheme for the topology shown for The Evergreen Resort network
- Introduction to Fintech Assignment, APU, Malaysia Revolute is a British financial technology company that offers banking services Headquartered in London
- USPP3014: Metaphysics Research Paper, UUM, Malaysia F. H. Bradley philosophizes that metaphysics is the finding of bad reasons for what we believe upon instinct
- BBNG3103: What is the meaning of foreign direct investment (FDI)? Give examples of FDI that are related to Malaysia: International Business Assignment, OUM, Malaysia
- BGN352: Building Law Assignment, UiTM, Malaysia English Law plays an important part in the Malaysian legal system and Explain the application of English Law as a source
- AACS3064: Computer Systems Architecture Assignment, TARC, Malaysia Suggest an application program / system which includes arithmetic computations from any one of the following industries
- MKW2460: Integrated marketing communication Report, MUM, Malaysia Your group is to assume that you are the Marketing Communication Manager (IMC Manager), and you are to develop a new product