The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 313 Weeks Ago, 6 Days Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
I need some help with a final presentation. I have attached my previously completed work and the guidelines for this assignment. Please let me know if you need anything or have any questions
Â
4-2 Final Project Milestone Two: Presentation Summary
Walmart Information Technology Security Awareness
Jason Wedge
Southern New Hampshire University
IT-241-R5860 Human Factors in Cybersecurity 17EW5
Â
Â
Â
Â
Â
Â
Â
Â
Â
Walmart Information Technology Security
Introduction
In recent years, theease of access tothe internet has led to many organizations to experience huge losses due to securityattacks. Complying with information security regulations of Walmart is a core area in strengthening information security through understanding human behavior (Shaw et al., 2009). Walmart is establishing information security awareness programs to be sure their employees are aware and well-informed on the security risks.
Unintentional Human Error
Information security assessments have shown that 95% of information security incidents are mainly caused by human error. It’s considered one of the most important factors affecting security. Some forms of unintentional human errors associated with IT Security include: lost devices, incorrect email information disclosure, password sharing, unsafe URLs and Popups. Development of helpful programs within Walmart will assist in implementing strategies that will help tackle common human errors (Ramalingam et al, 2016). These programs focus on the elimination of practices that enable users in making such errors. This can be achieved from the use of safeguard automations like management of passwords and automated standby locks. Such programs will also look into mitigating the consequences from the errors made before an attack can happen. Examples include: audits and surveillance, systems monitoring and internal control.
Malicious Human Behavior
Hacking is one of the greatest problems faced with organizations globally and could as well be experienced in Walmart. Before addressing these kinds of threats, programs look into understanding the primary types of insider risks. Monitoring IT admins, key vendors, top executives and employees with vigilance will enable an organization to prevent such threats. Not forgetting the basics is also a key element in security awareness. For example, the use of software patches will automatically close that window before a hacker can access your network.
Organizational Factors
Findings suggest that organizational factors play a significant role in the security awareness. Policy issues, management, training and technology are examples of organizational factors. As the number of applications and systems increase, the greater the hazards technology may experience and this calls for tightening security (Wilsone et al, 1998). Walmart’s environment, beliefs and attitudes on the technology itself may cause IT insecurities. Programs will focus on ways managers will not only focus on technology-related issues but also the environment in which IT will be used. An organization might also lack funds for securing confidential information from unauthorized accesses.
Conclusion
There is a needto implement security policies to reduce security incidents in Walmart. Information technology security awareness programs will enable the management to effectively discuss methods they can use to protect documents. A good awareness program will help the company to understand risks and assist in developing economic tools for prevention.
Â
Â
Â
Â
References
Shaw, R. S., Chen, C. C., Harris, A. L., & Huang, H. J. (2009). The impact of information richness on information security awareness training effectiveness. Computers & Education, 52(1), 92-100.
Wilson, M., de Zafra, D. E., Pitcher, S. I., Tressler, J. D., &Ippolito, J. B. (1998). Information technology security training requirements: A role-and performance-based model (No. NIST-SP-800-16). NATIONAL INST OF STANDARDS AND TECHNOLOGY GAITHERSBURG MD COMPUTER SECURITY DIV.
Ramalingam, R., Khan, S., & Mohammed, S. (2016). The need for effective information security awareness practices in Oman higher educational institutions. arXiv preprint arXiv:1602.06510.
Â
----------- Â ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly