Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure. Define an auditing plan which includes:
- post-audit activities
- log management
- testing of security systems
Select three of the following end-user breaches for your assignment:
- Open network drive shares allow storage privileges to outside users.
- Sensitive laptop data is unencrypted and susceptible to physical theft.
- Remote users do not have recent patches or current updates.
- Removable storage drives introduce malware filtered only when crossing the network.
- Predictable passwords meet minimum length requirements but remain easily guessable.