Please enable JavaScript.
Coggle requires JavaScript to display documents.
Research Report Brainstorm - Coggle Diagram
Research Report Brainstorm
F
ind the problem
Field:
Networking and Security
Topic:
Security Issues in Business Setting
Possible Refinements
Growing Security Concerns
New security challenges from working from home
What are the effects of these challenges?
What are the security threats of work from home
How can we help alleviate these issues
Effects of poor secuity
Consequences
Costs
Does cost of higher security outweigh consequences and costs of poor security
Identify
research topic
What are the security challenges associated with remote work and how can we help address them
A
sk what's at stake
What are the consequences of not addressing security concerns
Loss of sensitive client data
Passwords,Email,Phone#
Hurts company reputation and trust
Ransomware
Could result in company loosing loads of important data unless they pay ransom costs
Sensitive company data could be stolen
Source code for product
Design plans for product
Remote work only recently become more mainstream
Security challenges not previously known or thought of could emerge
C
onsider resources and Generate Solutions
Solution 2:
Provide training for employees. Inform them about creating strong passwords, good security practices(ex not downloading from sketchy sites), and how to avoid being a victim of social engineering. This allows employees to avoid basic attacks that also tend to be the most common.
Solution 1:
Hire an offensive security group to perform penetration testing on remote systems. This will allow us to find any open security threats
E
valuate Solutions
Solution 2:
This solution is the cheapest to implement and the easiest. A simple self guided course could be provided to increase employee knowledge and help reduce the chance of security breaches. This solution would however consume employee time.
This is the best solution
Solution 1:
This solution is the much more expensive. It requires the hiring of a third party but it doesn't consume employee time. It doesn't however address security issues related to bad employee security practices. This means this isn't the best solution, however it could be combined with the solution 2.
Resources:
Own Knowledge, Can gather additional information for report from offensive security firm reports