Security Gaps and Mitigations

Answer the following to the best of your ability in complete sentences with proper spelling and grammar. Be sure to elaborate on your answers and provide support for each of your statements. Your textbook and your own knowledge are your sources for answering questions unless otherwise instructed. Format your answers in blue font. Recall that you must cite any sources, and it is never okay to copy from any source. Answers should be paraphrased in your own words, and you should explain your answers and support your statements. TurnItIn Plagiarism checking is run against all submissions. Your work must be below a 40% match overall and no more than 20% match per question.

This week you will be working on Part 1 of your Project.

Project Part 1: Security Gaps and Mitigations


You are the newly hired chief information officer (CIO) for Premier University, a public university with 30,000 students and approximately 5,000 faculty and staff members.

Premier University experienced a data breach approximately six months ago. During that breach, a laptop owned by the institution was stolen from a staff member’s car. The staff member worked in the institution’s financial aid office. The laptop was not password protected or encrypted, and data belonging to about 5,000 former students, including Social Security numbers (SSNs), name, and credit card information, was exposed.

Premier University did not have an incident response function at that time, so the university’s response to the breach was poor. After the staff member reported the stolen laptop to campus police, it took the institution almost 90 days to determine that personally identifiable data was stored on the device, and then another 30 days to inform affected individuals about the breach of their information.

The breach was reported in local news media, and the institution’s press representative could not answer the reporter’s questions about how students should protect themselves and their data following the breach. After the news report, many Premier University alumni complained to Premier’s president about the institution’s poor breach response. As a result, donations from alumni have dropped slightly.

You were hired after the breach to help the institution improve its information security program.


The Premier University president has asked you to outline potential gaps and weaknesses that lead to the data breach six months ago, and to identify potential improvements to overcome those gaps and weaknesses.

For this part of the project:

  • Research the weaknesses indicated in the scenario and solutions other institutions have implemented to prevent them from occurring in the future.
  • Create a professional report for the university president that addresses the following:
    • The weaknesses you discovered about the data breach incident (as indicated in the scenario)
    • Relevant mitigations for each weakness
  • In the report, include any sources you consulted.

Required Resources

  • Internet access
  • Course textbook

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Times New Roman, size 12, double-space
  • Citation Style: Use APA 7 style guide
  • Length: 3 to 4 pages

Self-Assessment Checklist

  • I researched weaknesses indicated in the scenario and solutions other institutions have implemented to prevent them from occurring in the future.
  • I addressed the weaknesses and relevant mitigations for each weakness.
  • I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
  • I followed the submission guidelines.

Do you need urgent help with this or a similar assignment? Say no more, we have just the experts you need to help you. Place your order.

Scroll to Top