Verified Document

Preventing Data Breaches Term Paper

IT Security A major challenging impacting employers, is having a comprehensive security plan that will safeguard the personal information of their clients and employees. While at the same time, it must be able to streamline the different administrative and technical functions. The result is that firms must develop and update their strategies to deal with the changing nature of the threats they are facing. To fully understand how they are able to achieve these objectives requires focusing on the data security coordinator, internal risks, external risks, external threats and data protection. Together, these elements will illustrate which factors are most important and the way an organization can mitigate them over the long-term. (Oz, 2009) (Sousa, 2014) (Veiga, 2007)

Data Security Coordinator

To be more effective, all firms must introduce a proactive approach that deals with possible challenges early and utilize their experiences to enable the organization to achieve critical objectives. While at the same time, they have to be capable of understanding and addressing key areas of resistance through a hybrid model. The implementation will focus on rolling out new solutions within a 6-month timeframe. During this time, employees will be provided with initial and continuing training. Testing will involve consultants testing...

The service providers will work with this individual to understand what is most important to them and deal with these issues early. (Oz, 2009) (Sousa, 2014) (Veiga, 2007)
Internal Risks

Internally, there will be a series of checks and balances to prevent breaches from rouge employees. This means that the passwords will be changed every 60 days. There will be restricted access to the most sensitive information based upon a series of firewalls. The records will require entering three different user names and passwords to access them. Any unusual activities will be reported to data security coordinator. They will isolate and analyze the nature of the threats. Terminated employees will not have access to company platforms (via a suspension of their clearance). (Oz, 2009) (Sousa, 2014) (Veiga, 2007)

External Risks

To prevent breaches a series of firewalls will be interconnected. This will prevent hackers from accessing information by going through one security protocol. The data files will be encrypted when they are viewed and transmitted. At the same time, the IT strategy addresses authentication procedures through determining where the network is accessed and who it is. The controls will monitor who accesses various parts based upon varying levels of clearance. (Oz, 2009)…

Sources used in this document:
References

Oz, E. (2009). Management Information Systems. Boston, MA: Thompson.

Sousa, S. (2014). Management Information Systems. Mason, OH: Southwestern.

Veiga, A. (2007). An Information Security Governance Framework. Information Systems Management, 24 (4), pp. 361 -- 371.
Cite this Document:
Copy Bibliography Citation

Related Documents

Preventing Data Overload in Qualitative Data Management
Words: 2515 Length: 8 Document Type: Research Paper

Qualitative Data ManagementIntroductionQualitative research can lead to results that are rich in content, but it is also a process often characterized by extensive amounts of data, and conclusions drawn from a narrative that is subjective in nature (Silverman, 2016). Levine's (1985) perspective on the need for a systematic approach to managing such data highlights an important aspect of how one should conduct qualitative research. This paper examines the issues can

Preventing Security Breaches and Hackers
Words: 582 Length: 2 Document Type: Essay

Network Security Controls and Issues The many challenges of network security can be understood by realizing who needs access to the network itself. Access to secure networks should be accompanied by a certain need or reason by a person who has the authority to view, manipulate or reproduce information and data contained within that network. Access problems arise when there are no clear boundaries or guidelines as to who should have

Big Data Annotated Bibliography
Words: 1639 Length: 4 Document Type: Annotated Bibliography

Authors Note: Rosenbaum is technology and retail analysts. She writes articles for the New York Times and Forbes. Saikali, A. (2013, December 30). The Target Data Breach Lawsuits: Why every Company Should Care. Data Security Law Journal. Retrieved from: http://www.datasecuritylawjournal.com/2013/12/30/the-target-data-breach-lawsuits-why-every-company-should-care/ The article provides insight on the number of lawsuits filed against different organizations and strengthens the need for the companies to protect their information from data breach. The article shows the significant

Heartland Data Breach May Well Have Been
Words: 744 Length: 2 Document Type: Essay

Heartland Data breach may well have been one of the biggest security breaches ever perpetrated. Heartland Payment Systems, Inc. (HPS) provides debit, prepaid, and credit card processing, online payments, check processing, payroll services as well as business solutions for small to mid-sized industries. Approximately, 40% of its clients are restaurants. HPS is the fifth largest credit card processor in the United States and the 9th largest in the world. The breach

Preventing Phishing Attacks End User Training
Words: 1556 Length: 5 Document Type: Essay

Critical Thinking: Addressing the Data BreachA data breach within our organization has occurred and requires immediate attention. This incident involves the unauthorized access and potential dissemination of sensitive data. It has serious legal and organizational implications. Understanding the full extent of the breach and its impact is imperative. To obtain this understanding, this critical thinking paper applies critical thinking and analytical skills to dissect the problem, identify the root causes,

Security Management the Role of a Security
Words: 4672 Length: 15 Document Type: Essay

Security Management The role of a security manager varies widely according to the particular organization and its needs, but despite this variety, there remain certain best practices and policies that can help maintain security and stability. This is nowhere more true than in the case of organizational loss, because while loss can mean widely different things depending on the field, the underlying theoretical concepts which inform attempts to minimize loss are

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now