Loss of laptops in business
Most businesses are worth to worry about the securities in their laptops and the security as well. Most of the business laptops are vulnerable to loss and theft due to weak security systems.48 of NASA laptop are stolen from the American space agency that contains control codes of the International Space Station ISS appears to be jeopardy, but the NASA speaks with the Security News Daily that it’s a big problem to losing a laptop even when governing small business. NASA inspector general then says one percent of the portable device is encrypted and leaving the other 99 percent agency laptops unprotected, thus string employees’ data and also the government secrets and third party intellectual property in danger.
Loss of laptops in business is figured as big nightmare insecurity, thus making the encryption a big challenge. NASA is an excellent example in the encryption .encryption can be on a laptop, file, folder, or the drive that leaves a significant error to the user’s discretion. Managed encryption is a better idea and more costly for enterprise resources. In implementing this chain of command, it involves more people and system, thus leaving no doubt in making lots of planning and commitment. Don't use plagiarised sources.Get your custom essay just from $11/page
The average value for a lost laptop is computed as more than $49000and, thus making sure than laptops encrypts before moving out of the room with sensitive information that is worth an investment. The laptop loss contained files, emails that had some security numbers and forms of personally identifiable information for employees and contractors. From the theft result, NASA contacts with some companies that could provide monitoring services to these affected people. It thus estimates a significant loss, which costs approximately $500000.
NASA then offers ten of thousands of portable devices to its employees and contractors that include several laptops computers. These computers process is to store the SBU data, social security, and some of the sensitive operation and programs of NASA. There are a variety of reasons that would help prevent this unutilized access to data on NASA computers. These include password protection, encryption of individual files. These restrict unauthorized access to information even when the laptop is lost.
NASA office of chief information officer controls the Agency institutional system and networks that are used in the administrative support functions such as budgeting and human resource. The institution support daily activities of NASA scientist, networks and mission personal support.
As an appointed manager of NASA to control the movement of the laptop, purchasing, and managing them, I come up with a plan to help avoid this theft of laptops. In modern life, people do not sweat much due to the loss of hardware that has come down to price. From the understanding, the real cost of a laptop is from the actual exposure of data on the PC more, especially to customers’ data and information. The average price of a lost laptop average to a cost of $49000that includes the calculation of components like a laptop replacement, detection, and escalation, forensic and investigation, data bleaching reports and mitigation, intellectual property loss, lost productivity and legal and regulatory costs.
Hardware cost does not vary much in an industry as much as that of data loss cost that is differential. To account for the occurrence of a data loss cost, 80% of the total cost. At the same time, the average value is $49000.its, thus possible for the actual price to be much higher than the incase of the data breach that involves thousand of sensitive data.NASA is, therefore, looking for useful statistics and information that would help in justifying the best security measures of the company.
As the manager of NASA, I then look for the best suitable technology that would help to program the laptop. In this, the intel Anti-theft technology PC(Intel-AT) option is best. Intel –AT uses a set of programs and interdependent hardware triggers and responses that identify unauthorized attempts to access encrypted data and operating systems. This software product helps to send signals to the lost laptop and prevents an unauthorized person from accessing the information. In conjunction with the Intel –AT is the Altikilis of the flexible toolkit, which allows the delete of data on missing computers and produces an audit log of the deleted files to prove reasonable compliance with the corporate regulator.
Technology offering to the computer such as Lenovo thinks pad of constant secure remote disable, .which allows the remote shutdown in case of a lost laptop and offers a message SMS through a designated phone. This technology solution also requires aa embedded wireless WAN card in the PC and mobile communications subscription that would allow the PC to receive text messages from the PC. These would much help just in case your computer is stolen, and this text message would track it down to the hardware level and turns it into a blick. In case of the PC turn again, you can retrieve your data without any loss.
The system track is again essential and more managed by the dell service. These help to track the missing computer and connect it to the internet that enables the IT administrators to perform some data and service activities that includes deletion of the sensitive data, system lockdown and emergency retrieval of the critical files. These would help out to forensically mine the loss of computer and laptop over the internet using some of the variety procedure.
All this solution would help it would help prepare the PC before its loss and after the injury. The so solution relies on different technologies and multiple services to help that would make work just right. These would help, thus, prevent the loss of data and minimize the cost of taking the responsibilities of the NASA laptop distribution.
A stolen laptop is not the only loss a company goes through as replacing the hardware, which averages to cost of the data breach. Password is considered as a barrier in keeping authorized people from accessing the sensitive corporate data. Most of the employees lose data from the coffee shop, aircraft,and other unauthorized places. These make people access the companies network of information, thus creating a zero guarantee of keeping the company safe and secure. These make the company stress in keeping a watchful eye on corporate devices. with this in mind NASA thus make some proactive strategies that would help keep this organization pure;
Stop fighting the BYOD movement.this is where the company employees bring their own devices in the workplace and becoming overwhelmed by managing the company hardware. To cut this cost, NASA then buys the employee’s laptops, and instead of the employees going to the IT for support, it contacts the company manufacturers for help. In using a one login desktop, makes the IT manage the accounts well.
Stop complicating matters for the employees. Most of the employees are exhausted. In communication coming from the IT, that requires them to follow some security protocol. These cause the users to suffer security fatigue and thus ignores some essential updates to company security measures.NASA thus introduces some security policies and technologies that would not exhaust the users.this is through a single sign-on solution that would remove steps in the authentication process and without compromising the security. For example with one sign-in solution, users can log in to their laptops and access all the information they require without authentication processes of the third party creating fatigue
Kill or be killed .this strategy can not stand alone, and thus the IT needs to be proactive in ensuring that company data is protected. In this, the company installs an instant kill switch and the IT to revolve a certificate of the desktop to ensure that no one can log in to the account. These ensure that the stolen laptop is worthless since it blocks all unauthorized users.
Keep what is essential in one secure location. Through a unified access policy, the IT team can help manage the device and application security systems from a single place .this makes the onboarding and offboarding process run smoothly, especially in checking the employees and contractors are offloaded.
NASA should thus safeguard their laptops as, without the proper safeguard, the company data can easily be accessed if their laptop goes missing or gets lost. With the appropriate measure, NASA company can get ahead of cybercriminals and be prepared in case of a lost laptop.
In computing for confidentiality and threats of a laptop, some of the ways to consider that encounter to the dangers in information are hackers, masqueraders, the trojan horses, and social engineering. This effectively avoids risk and plan for budgets for information risk management and other related risk activities. Thus it helps express losses for the annual terms as in the different algorithms.
Risk assessment computation involves a method that uses to deal with the threats, vulnerabilities, and loss of information.NASA is faced with a vulnerability which impacts the business process. To take care of this, NASA uses the risk assessment to measure how this organization can turn if the real threat turns in real if the business vulnerability exploits. To begin this, we compute using this formula.
SLE *ALO =ALE
Meaning that;
SLE-single loss expectancy –the value that you expect to lose at any time the risk turns real.
ALO-annualized rate of occurrence –the chance of the risk turns real expressed as a percentage.
ALE-the value that you measure if the real turn real in one year.
Single loss of expectancy is calculated in two ways of variables ;
AV*EF, which means that the Asset value *Exposure factor.
The Asset value is the cost that cost the organization, how much the organization would lose if the asset fail.
The exposure factor is how long this would cost if the assets stay in failure
In keeping the originals variables in mind, we take the formula as
(AV*EF) *ALO= ALE
Thus given the asset value of the laptop as $49000 and the period is in two years and the annualized d rate as 80% then we compute the ALE as
($49000*2)*80%=$122500
AV=$49000
EF=2years
ALO=80%=0.8
ALE=$122500. These would be the risk assessment.
Risk management is an assessment that is crucial in an organization .without the evaluation. It makes it impossible to site a good security policy that would defend your company’s critical assets. Risk assessment requires the individual to take charge of risk management.NASA manager is thus in charge of the evaluation of the risk, therefore, would take charge to know the goals and objectives of the company and its ultimate responsibility. Through solving the risk assessment, the NASA manager should be aware of the threats, vulnerabilities, and controls. For risk management to be successful, NASA manager ensures the employees of this group to be more useful;
information system security, IT and operations management; System and network administration; Internal audit; Physical security; Business process and information owners; Human resources; Legal; Physical safety.
Apart from determining the ways of risk assessment and management, NASA manager thus uses some ideas that would help in identifying these risks that would help in deciding what and how to deal with them
Risk reduction –NASA manager developed a measure that would help reduce the risk
Risk transference –NASA purchases insurance that would transfer a portion to the third party in case of a loss.
Risk acceptance –NASA manager agrees to deal with the risk by accepting the potential cost of the loss
Risk rejection.-This appears not to be easy but can ignore the threat and pretend it did not happen.
As no one suggest to lose a laptop, some of the things s to do to avoid these risks from happening to that would reduce the risk to the information and potential regal repercussions .as in many security measures, the company plans to give the best defense which makes the best offense.
NASA company sets up a password with an auto-lock; this is to protect the device from data encrypts from strangers.
Encrypts the hard drive making it the most more accessible way to protecting data in the laptops
NASA urges all employees to sync in their information to help avoid casualties in case of a laptop loss
NASA employees are encouraged to keep the registration codes safe so as making it easy for them to track these devices
Also, NASA ensures that all data is encrypted even from the portable devices as flash disk, and the hard drives as well
Set up a remote-tracking or wiping .this is a more suitable way that would help the company retrieve lost laptops.