Preventing Data Breaches Term Paper

PAGES
2
WORDS
655
Cite

IT Security A major challenging impacting employers, is having a comprehensive security plan that will safeguard the personal information of their clients and employees. While at the same time, it must be able to streamline the different administrative and technical functions. The result is that firms must develop and update their strategies to deal with the changing nature of the threats they are facing. To fully understand how they are able to achieve these objectives requires focusing on the data security coordinator, internal risks, external risks, external threats and data protection. Together, these elements will illustrate which factors are most important and the way an organization can mitigate them over the long-term. (Oz, 2009) (Sousa, 2014) (Veiga, 2007)

Data Security Coordinator

To be more effective, all firms must introduce a proactive approach that deals with possible challenges early and utilize their experiences to enable the organization to achieve critical objectives. While at the same time, they have to be capable of understanding and addressing key areas of resistance through a hybrid model. The implementation will focus on rolling out new solutions within a 6-month timeframe. During this time, employees will be provided with initial and continuing training. Testing will involve consultants testing...

...

The service providers will work with this individual to understand what is most important to them and deal with these issues early. (Oz, 2009) (Sousa, 2014) (Veiga, 2007)
Internal Risks

Internally, there will be a series of checks and balances to prevent breaches from rouge employees. This means that the passwords will be changed every 60 days. There will be restricted access to the most sensitive information based upon a series of firewalls. The records will require entering three different user names and passwords to access them. Any unusual activities will be reported to data security coordinator. They will isolate and analyze the nature of the threats. Terminated employees will not have access to company platforms (via a suspension of their clearance). (Oz, 2009) (Sousa, 2014) (Veiga, 2007)

External Risks

To prevent breaches a series of firewalls will be interconnected. This will prevent hackers from accessing information by going through one security protocol. The data files will be encrypted when they are viewed and transmitted. At the same time, the IT strategy addresses authentication procedures through determining where the network is accessed and who it is. The controls will monitor who accesses various parts based upon varying levels of clearance. (Oz, 2009)…

Sources Used in Documents:

References

Oz, E. (2009). Management Information Systems. Boston, MA: Thompson.

Sousa, S. (2014). Management Information Systems. Mason, OH: Southwestern.

Veiga, A. (2007). An Information Security Governance Framework. Information Systems Management, 24 (4), pp. 361 -- 371.


Cite this Document:

"Preventing Data Breaches" (2015, February 21) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/preventing-data-breaches-2148710

"Preventing Data Breaches" 21 February 2015. Web.25 April. 2024. <
https://www.paperdue.com/essay/preventing-data-breaches-2148710>

"Preventing Data Breaches", 21 February 2015, Accessed.25 April. 2024,
https://www.paperdue.com/essay/preventing-data-breaches-2148710

Related Documents

victims of an organization's data breach? The largest data brokers, government agencies, retailers, Internet businesses, financial institutions and educational institutions of the nation have disclosed a number of computer intrusions and data breaches. A data breach can take place in case of theft or loss of, or some kind of illegal access to the data that contains sensitive information which is personal and can compromise the integrity or confidentiality of

Qualitative Data ManagementIntroductionQualitative research can lead to results that are rich in content, but it is also a process often characterized by extensive amounts of data, and conclusions drawn from a narrative that is subjective in nature (Silverman, 2016). Levine's (1985) perspective on the need for a systematic approach to managing such data highlights an important aspect of how one should conduct qualitative research. This paper examines the issues can

Network Security Controls and Issues The many challenges of network security can be understood by realizing who needs access to the network itself. Access to secure networks should be accompanied by a certain need or reason by a person who has the authority to view, manipulate or reproduce information and data contained within that network. Access problems arise when there are no clear boundaries or guidelines as to who should have

Security The author of this report has been asked to answer a few questions as it relates to information security. Specifically, it will be answered to what metrics or proverbial yardsticks could or should be used to measure information security and information privacy. Indeed, there are a number of ways to measure precisely that. However, there are implications with doing do that have a bearing on both privacy and security

Marriott Data Breach
PAGES 5 WORDS 1448

Security in Networking Data breaches have become common in today’s business environment as organizations are increasingly vulnerable to a data breach or cyber-attack. Jain & Ropple (2018) state that many companies or institutions face huge challenges in successful management of cyber risk despite increased expenditures on their network security. Even though some industry standards have been established, they are relatively vague. Additionally, existing solutions for safeguarding companies or institutions against data

Argumentative Essay between Data Collection Versus Data Privacy Argumentative Essay between Data Collection Versus Data PrivacyBased on Statista Research Department (2022), the amount of data created, captured, copied, and consumed worldwide is approximated to be reaching 64.2 zettabytes. It is projected to increase rapidly to over 180 zettabytes over the next five years. The growth of these individual data sets collected daily exposes many individuals to data privacy issues. For