Preventing Data Breaches Term Paper

Length: 2 pages Sources: 3 Subject: Education - Computers Type: Term Paper Paper: #67526744 Related Topics: Firewalls, Flooding, Computer Viruses, Internet Protocol

Excerpt from Term Paper :

IT Security A major challenging impacting employers, is having a comprehensive security plan that will safeguard the personal information of their clients and employees. While at the same time, it must be able to streamline the different administrative and technical functions. The result is that firms must develop and update their strategies to deal with the changing nature of the threats they are facing. To fully understand how they are able to achieve these objectives requires focusing on the data security coordinator, internal risks, external risks, external threats and data protection. Together, these elements will illustrate which factors are most important and the way an organization can mitigate them over the long-term. (Oz, 2009) (Sousa, 2014) (Veiga, 2007)

Data Security Coordinator

To be more effective, all firms must introduce a proactive approach that deals with possible challenges early and utilize their experiences to enable the organization to achieve critical objectives. While at the same time, they have to be capable of understanding and addressing...


The implementation will focus on rolling out new solutions within a 6-month timeframe. During this time, employees will be provided with initial and continuing training. Testing will involve consultants testing the systems vulnerabilities. The service providers will work with this individual to understand what is most important to them and deal with these issues early. (Oz, 2009) (Sousa, 2014) (Veiga, 2007) Internal Risks

Internally, there will be a series of checks and balances to prevent breaches from rouge employees. This means that the passwords will be changed every 60 days. There will be restricted access to the most sensitive information based upon a series of firewalls. The records will require entering three different user names and passwords to access them. Any unusual activities will be reported to data security coordinator. They will isolate and analyze the nature of the threats. Terminated employees will not have access to company platforms (via a suspension of their clearance). (Oz, 2009) (Sousa, 2014) (Veiga, 2007)

External Risks

To prevent breaches a series of firewalls will be interconnected. This will prevent hackers from accessing information by going through one security protocol. The data files will be encrypted when they are viewed and transmitted. At the same time, the IT strategy addresses authentication procedures through determining where the network is accessed and who it is. The controls will monitor who accesses various parts based…

Sources Used in Documents:


Oz, E. (2009). Management Information Systems. Boston, MA: Thompson.

Sousa, S. (2014). Management Information Systems. Mason, OH: Southwestern.

Veiga, A. (2007). An Information Security Governance Framework. Information Systems Management, 24 (4), pp. 361 -- 371.

Cite this Document:

"Preventing Data Breaches" (2015, February 21) Retrieved May 30, 2023, from

"Preventing Data Breaches" 21 February 2015. Web.30 May. 2023. <>

"Preventing Data Breaches", 21 February 2015, Accessed.30 May. 2023,

Related Documents
Data Breaches and Social Engineering
Words: 1639 Length: 5 Pages Topic: Business Paper #: 92163628

victims of an organization's data breach? The largest data brokers, government agencies, retailers, Internet businesses, financial institutions and educational institutions of the nation have disclosed a number of computer intrusions and data breaches. A data breach can take place in case of theft or loss of, or some kind of illegal access to the data that contains sensitive information which is personal and can compromise the integrity or confidentiality of

Preventing Security Breaches and Hackers
Words: 582 Length: 2 Pages Topic: Education - Computers Paper #: 38553305

Network Security Controls and Issues The many challenges of network security can be understood by realizing who needs access to the network itself. Access to secure networks should be accompanied by a certain need or reason by a person who has the authority to view, manipulate or reproduce information and data contained within that network. Access problems arise when there are no clear boundaries or guidelines as to who should have

Monitoring to Prevent Data Breaches
Words: 702 Length: 2 Pages Topic: Black Studies - Philosophy Paper #: 65892242

Security The author of this report has been asked to answer a few questions as it relates to information security. Specifically, it will be answered to what metrics or proverbial yardsticks could or should be used to measure information security and information privacy. Indeed, there are a number of ways to measure precisely that. However, there are implications with doing do that have a bearing on both privacy and security

Marriott Data Breach
Words: 1448 Length: 5 Pages Topic: Information Technology Paper #: 25123932

Security in Networking Data breaches have become common in today’s business environment as organizations are increasingly vulnerable to a data breach or cyber-attack. Jain & Ropple (2018) state that many companies or institutions face huge challenges in successful management of cyber risk despite increased expenditures on their network security. Even though some industry standards have been established, they are relatively vague. Additionally, existing solutions for safeguarding companies or institutions against data

Heartland Data Breach May Well Have Been
Words: 744 Length: 2 Pages Topic: Education - Computers Paper #: 5597542

Heartland Data breach may well have been one of the biggest security breaches ever perpetrated. Heartland Payment Systems, Inc. (HPS) provides debit, prepaid, and credit card processing, online payments, check processing, payroll services as well as business solutions for small to mid-sized industries. Approximately, 40% of its clients are restaurants. HPS is the fifth largest credit card processor in the United States and the 9th largest in the world. The breach

Facebook Data Breach Essay
Words: 2294 Length: Pages Topic: Paper #: Array

In this Facebook data breach essay, we discuss how Facebook allowed applications to mine user data.  The essay will explain what data was breached, how it was breached, and how that data was used.  Furthermore, the essay will also discuss the repercussions of the breach, including Facebook founder Mark Zuckerberg’s hearing in front of the United States Senate, issues involving Cambridge Analytical, and information that is being revealed about additional