• Home
  • Blog
  • Information Security Engineer Case Study

Information Security Engineer Case Study

0 comments

Your instructor will assign you to a group. Within your group you can set up a group WebEx, chat, skype, or other communication tool to determine how best to complete this case study. Each person will contribute to the collaboration portion to complete this case study. Include the Names of each member on your team and a brief description as to how they participated.

Active participation is expected, but the quality, not the quantity, is the key to creating a successful collaborative learning environment for everyone. Instructional approaches for this course are highly interactive and experiential.

Scenario/Summary

You have just been hired as an Information Security Engineer for a large, multi-international corporation. Unfortunately, your company has suffered multiple security breaches that have threatened customers’ trust in the fact that their confidential data and financial assets are private and secured. Credit-card information was compromised by an attack that infiltrated the network through a vulnerable wireless connection within the organization. The other breach was an inside job where personal data was stolen because of weak access-control policies within the organization that allowed an unauthorized individual access to valuable data. Your job is to develop a risk-management policy that addresses the two security breaches and how to mitigate these risks.

You will submit your answers as a single paper from the team. Include the Names of each member on your team and a brief description as to how they participated.

Your required reading by Mladenovic, Martinov-Bennie, and Bell (2019) provides business students’ insights into their development of ethical decision making. Examine ethical decision-making processes and provide research on that information. Next, describe your beliefs and assumptions about ethics. Suggest areas for improvement in student education relative to ethical decision making.

Embed course material concepts, principles, and theories (including supporting citations) along with at least one current, scholarly, peer-reviewed journal article. You may find that your discussion of leadership characteristics is easily supported with such current scholarly research while the information about how your chosen leader exhibits those leadership characteristics is supported by popular research.

one page

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}