LEI3044: MANAGING SECURED ENVIRONMENTS Assignment, SUC, Malaysia You are required to build an insider threat mitigation program for your company
University | Saito University College (SUC) |
Subject | LEI3044: MANAGING SECURED ENVIRONMENTS |
Group Assignment : Insider Threat Mitigation
Surveys indicate that many workers are reluctant to report unethical practices, including stealing in the workplace. Although a law was passed to counter unethical corporate behaviour and protect workers who report unethical activities, many employees still face loss of their jobs or ridicule if they blow the whistle on corporate misconduct (Spherion, 2006) Further, it has been reported that nearly 25% percent of young workers aged 18 to 24 do not believe that stealing office supplies for personal use is wrong.
Many steal employer property, including pens, pencils, paper, self-adhesive notepads, and paper clips without regard to the activity’s illegality. Employee theft costs American business over $40 billion each year.
(Wulfhorst, 2006) Unethical behaviour, dishonesty and theft in the workplace often occur in a gradual incremental process. Theft, in particular stems from a complex set of causes. Foremost among them is simply that an opportunity to steal arises, because chances of getting caught are low.
Additional causes include low workforce morale, employees’ sense that they are being underpaid and minimal consequences for getting caught stealing (Walsh, 2000) As seemingly insignificant misconduct and theft go undetected, perpetrators often rationalize larger transgressions. Even high-level executives can become tempted to steal. Consider Dale Frantz, the former chief information officer of Auto Warehousing Company.
Frantz embezzled more than $500,000 from his company during 2007-2009 and was sentenced to nearly 6 years in prison. He used a number of strategies to steal the funds, including writing up fraudulent invoices for expense reports and changing legitimate reports to maximize his reimbursements. In addition, he used company funds to buy computer equipment that he resold on the Internet.
Question :
A successful threat management strategy can reduce the risk posed by a person of concern, prevent an insider incident, and protect the organization and its people.
As a team in the security department, you are required to build an insider threat mitigation program for your company.
a) Plan
i. Management responsibility
ii. Establish goals/objectives
b) Organize and equipment
i. Detecting and identifying insider threats
ii. Threat management team
iii. Assess insider threats
c) Train and execute
i. Suggest ways to execute the plan
d) Evaluation and Improvement
i. Audit
ii. Compliance
Get Solution of this Assessment. Hire Experts to solve this assignment for you Before Deadline.
Get Help By Expert
Need expert assistance for the LEI3044 assignment? Look no further! Hire a Malaysian Assignment Expert at Assignment Helper MY to excel in your studies. Our Do My Assignment service guarantees high-quality work tailored to the requirements of Saito University College (SUC). With our team of experienced professionals, we ensure a secure environment for your academic success. Get reliable help today and achieve the grades you deserve!
Recent Solved Questions
- DPB20043: Management Information System Case Study, PM, Malaysia Choose a company that protects its products using any one of the types of intellectual property as the above diagram
- Enginnering Assignment, UMP, Malaysia Electrons or holes arc moved between two contacts by drift current in a Field Effect Transistor
- DPM10013: Principles of Marketing Assignment, PM, Malaysia ABC Mart is a 24-hour convenience store. It serves nearby residential communities and commercial and business
- KT24403: Operating Systems Assignment, UMS, Malaysia There are N philosophers and N forks, the philosophers represent processes and forks represent resources
- BEX1033: Statistics Assignment, UCSI, Malaysia Construct a data pool for the COVID-19 vaccine dose based on the sample block stated in Table Q1
- MPCF7113: Critically evaluate the business performance (for examples, sales, profit, production, and prospect): Corporate finance, Assignment 2, CU, Malaysia
- NWC4123: WebGoat is a deliberately insecure web application maintained by OWASP designed: Ethical Hacking Assignment, UPTM, Malaysia
- BGN352: Building Law Assignment, UiTM, Malaysia English Law plays an important part in the Malaysian legal system and Explain the application of English Law as a source
- Faculty of Business and Law Assignment, TU, Malaysia Analysis and discussion on the financial performance and Basically your financial performance analysis comprise of horizontal
- PCFE4013: This is an individual assignment that requires the students to do a summary writting on a selected articles: Foundations of Health and Epidemiology Assignment, ILKKM, Malaysia