Pick 3 Indiana companies, explore their website, and determine: Threat/Vulnerability/Threat Action What Vulnerability mitigation techniques can be used for your companies?

Management Of Information Security
6th Edition
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:WHITMAN, Michael.
Chapter11: Security Maintenance
Section: Chapter Questions
Problem 14RQ
icon
Related questions
Question

Pick 3 Indiana companies, explore their website, and determine:
Threat/Vulnerability/Threat Action
What Vulnerability mitigation techniques can be used for your companies?

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps

Blurred answer
Follow-up Questions
Read through expert solutions to related follow-up questions below.
Follow-up Question
  1. Eli Lilly and Company

    • Threat: Phishing attacks are a significant threat to pharmaceutical companies like Eli Lilly. Cybercriminals may attempt to impersonate the company to steal sensitive research or personal information.

    • Vulnerability: Employees may inadvertently fall victim to phishing emails, clicking on malicious links or downloading harmful attachments.

    • Threat Action: Cybercriminals send convincing-looking emails that appear to be from trusted sources, tricking employees into revealing sensitive information.

    • Vulnerability Mitigation Techniques:

      • Employee Training: Regular training and awareness programs can educate employees about the dangers of phishing and how to recognize phishing attempts.
      • Email Filtering: Implement advanced email filtering systems to identify and quarantine phishing emails before they reach employee inboxes.
      • Multi-Factor Authentication (MFA): Require MFA for accessing sensitive systems and data to prevent unauthorized access.
  2. Cummins Inc.

    • Threat: Industrial espionage and cyber-attacks are a concern for manufacturing companies like Cummins. Competitors or nation-states may attempt to steal intellectual property or disrupt operations.

    • Vulnerability: Vulnerable endpoints or unpatched systems within Cummins' network could be exploited to gain unauthorized access.

    • Threat Action: Attackers may employ malware or social engineering tactics to compromise endpoints and gain access to sensitive data.

    • Vulnerability Mitigation Techniques:

      • Regular Patch Management: Ensure all software and systems are up-to-date with the latest security patches.
      • Network Segmentation: Isolate critical systems from less critical ones to limit lateral movement for attackers.
      • Intrusion Detection Systems (IDS): Deploy IDS to detect and respond to suspicious activities within the network.
  3. Anthem, Inc.

    • Threat: Healthcare companies like Anthem are prime targets for data breaches due to the wealth of sensitive patient data they hold.

    • Vulnerability: Weaknesses in Anthem's data storage and access control systems could lead to unauthorized data access.

    • Threat Action: Attackers may attempt to infiltrate the network to steal medical records or commit identity theft.

    • Vulnerability Mitigation Techniques:

      • Data Encryption: Encrypt sensitive data both in transit and at rest to protect it from unauthorized access.
      • Access Control: Implement strict access controls and role-based permissions to limit who can access sensitive data.
      • Regular Security Audits: Conduct regular security audits and penetration testing to identify and address vulnerabilities proactively.

Could you please provide websites links for three websites? thank you

Solution
Bartleby Expert
SEE SOLUTION
Knowledge Booster
Primary components of process planning
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,
Principles of Information Security (MindTap Cours…
Principles of Information Security (MindTap Cours…
Computer Science
ISBN:
9781337102063
Author:
Michael E. Whitman, Herbert J. Mattord
Publisher:
Cengage Learning
Information Technology Project Management
Information Technology Project Management
Computer Science
ISBN:
9781337101356
Author:
Kathy Schwalbe
Publisher:
Cengage Learning
Principles of Information Systems (MindTap Course…
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781285867168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning