1. Identify assets and associated risks. This includes IT assets and individual clients and families and the...
Fantastic news! We've Found the answer you've been seeking!
Question:
1. Identify assets and associated risks. This includes IT assets and individual clients and families and the facility's staff and physical property. (also keep the donor list and info in mind)
2. Evaluate protective measures to protect assets from risks.
Transcribed Image Text:
The Hidden Pines Family Shelter is a non-profit organization that operates a facility for abused families and individuals. It is located in a mid-sized town in Virginia and serves the town and surrounding area. Persons and families are placed and referred to the facility by local social services and law enforcement agencies. The Shelter has two sites. One site is the administrative office where potential clients are qualified to seek Shelter services and routine office tasks are performed for the organization. The second site is the actual building where individuals and families are housed during their stay with the Shelter. The buildings are not in the same location and their locations are kept as secret as possible, especially the Shelter building. Actually, the buildings are hiding in plain sight in the community. The security of the buildings is obviously paramount for the safety of the Hidden Pines clients and staff. Routine IT security is a part of Hidden Pine's operations as with all other organizations. However, with smart phones and social media as vectors to reveal user's actual locations, physical security is a challenge to implement and maintain in this environment. It is easy to have potential threats to the clients find out the location of the shelter with these technologies and through the carelessness of clients. Here are some conditions and requirements listed for Hidden Pines: 1. All client records are kept in paper files for a period of time before being destroyed per federal and state law. The staff would like to consider an electronic database for these records. 2. There are two computers in the administrative building. One computer is the director's and the other is used by various staff and volunteers who staff the office. Both computers are connected to the Internet. The staff computer contains information about the organization's donors. 3. The Web site contains a list of donors for PR purposes. 4. The buildings have minimal security features. There are no security cameras, but there is an alarm system for both buildings. Both buildings are located close to a police station. 5. Clients are referred by social services and law enforcement agencies and may be admitted 24/7. A staff member is on call to conduct the admissions process during non-business hours. The shelter building is staffed by paid staff and volunteers 24/7. The Hidden Pines Family Shelter is a non-profit organization that operates a facility for abused families and individuals. It is located in a mid-sized town in Virginia and serves the town and surrounding area. Persons and families are placed and referred to the facility by local social services and law enforcement agencies. The Shelter has two sites. One site is the administrative office where potential clients are qualified to seek Shelter services and routine office tasks are performed for the organization. The second site is the actual building where individuals and families are housed during their stay with the Shelter. The buildings are not in the same location and their locations are kept as secret as possible, especially the Shelter building. Actually, the buildings are hiding in plain sight in the community. The security of the buildings is obviously paramount for the safety of the Hidden Pines clients and staff. Routine IT security is a part of Hidden Pine's operations as with all other organizations. However, with smart phones and social media as vectors to reveal user's actual locations, physical security is a challenge to implement and maintain in this environment. It is easy to have potential threats to the clients find out the location of the shelter with these technologies and through the carelessness of clients. Here are some conditions and requirements listed for Hidden Pines: 1. All client records are kept in paper files for a period of time before being destroyed per federal and state law. The staff would like to consider an electronic database for these records. 2. There are two computers in the administrative building. One computer is the director's and the other is used by various staff and volunteers who staff the office. Both computers are connected to the Internet. The staff computer contains information about the organization's donors. 3. The Web site contains a list of donors for PR purposes. 4. The buildings have minimal security features. There are no security cameras, but there is an alarm system for both buildings. Both buildings are located close to a police station. 5. Clients are referred by social services and law enforcement agencies and may be admitted 24/7. A staff member is on call to conduct the admissions process during non-business hours. The shelter building is staffed by paid staff and volunteers 24/7.
Expert Answer:
Related Book For
Posted Date:
Students also viewed these computer network questions
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
The Crazy Eddie fraud may appear smaller and gentler than the massive billion-dollar frauds exposed in recent times, such as Bernie Madoffs Ponzi scheme, frauds in the subprime mortgage market, the...
-
Write a program that takes three double command-line arguments x, y, and z, reads from standard input a sequence of point coordinates (xi, yi, zi), and prints the coordinates of the point closest to...
-
Grandparents want to make a gift of $100,000 for their grandchild's 20th birthday. How much would have to be invested on the day of their grandchild's birth if their investment could earn (a) 10.5%...
-
Oxford Corporation began operations in 2010 and reported pretax financial income of $225,000 for the year. Oxfords tax depreciation exceeded its book depreciation by $40,000. Oxfords tax rate for...
-
What is delegation? What is its significance in structural modeling?
-
Assume that all assumptions of the single-index model hold, except that the covariance between residuals is a constant K instead of zero. Derive the covariance between the two securities and the...
-
Image transcription text Engineering Feats and Disasters Presentation . 5 Minute Presentation (with Powerpoint and/or other visuals) . Capture the key information . What happened? . Why did happen? ....
-
GigaCo. manufactures 1-GB flash drives (jump drives). Price and cost data for a relevant range extending to 200,000 units per month are as follows: Sales price per unit (current monthly sales volume...
-
Suppose that on October 24 you Sell 6 March gold futures contracts for $335 per ounce. At 11:00 am on October 25 you buy 1 March contracts for $340.5 ounce. At the close of trading on October 25,...
-
What are several advantages of common stock?
-
Have you had to manage from a cost center type of report? If so, how was it categorized?
-
If so, do you use a computerized program?
-
What are two main advantages that the corporate form has over partnerships?
-
What is the major capital source for not-for-profit organizations, early in their existence?
-
A chemical company has a total income of 1.9 million per year and total expenses of 672066 not including depreciation. At the start of the first year of operation, a composite account of all...
-
Citing a scientific article, explain in your own words, how DNA fingerprinting has been used in forensic science to solve crimes and why it may not always be accurate or effective.
-
Does Theorem 1.9 need that (1, . . . , n) is a basis? That is, can we still get a well-defined and unique homomorphism if we drop either the condition that the set of 's be linearly independent, or...
-
Decide if these two are similar. 1-1 4 -3 -1 0 1-1
-
Find the span of each set and then find a basis for that span. (a) {1 + x, 1 + 2x} in P2 (b) {2 - 2x, 3 + 4x2} in P2
-
You lift a book at a constant speed. Which statement is true about the work W done by your hand and the change in the book's gravitational potential energy U g ? A. W> AU>0 B. W < AU <0 C. W=AU>0 D....
-
A positively charged particle moves from point I to point 2. As it does, its electric potential energy? A. Increases. B. Decreases. C. Stays the same. 102
-
At a point where the electric potential is 400 V, a positive charge is moving to the left. As the charge continues to move, it slows down, stops, and then begins to move back to the right. Using what...
Study smarter with the SolutionInn App