You are on page 1of 1

Information Security and Privacy in HRIS Jane s employer told her that she would be laid off in three

weeks. After two weeks, Jane realized that finding another secretarial job was going to be very tough. She became bitter. Her son told her about a virus that had infected. Jane took the infected disk to work and copied it onto the network server, which is connected to the company s mainframe. One month later, the company realized that some data and application programs had been destroyed. Discuss the potential consequences and give a preventive technique. Potential Consequence y y y y Data destroy Potential loss Cost needed to recover Company reputation destroy

Preventive techniques y y y y y y y Data backup Anti virus software Firewall Authorization control CCTV Identification control Network control

You might also like