Preview

Bus 2202 Unit 7 Information Security Case Study

Good Essays
Open Document
Open Document
803 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Bus 2202 Unit 7 Information Security Case Study
BUS 2202 Unit 7: Internet Trust, Security, and Privacy

UNIT 7: Information Security

UNIVERSITY OF THE PEOPLE UNIT 7: Information Security

In the textbook, it explains about three areas of accountabilities. They are Enterprise Security, Information Security, and Information Technology Security (Gelbstein, 2013). These securities are to protect information which is the assets of a company. A company must always comply with the laws and regulations, or even to the social norms relating to information security, and they should consider protection of the information as their duty. To maintain its information security, adopting appropriate control is needed. Here I will investigate the details of the three main areas of accountability
…show more content…
Building Management: Some companies implement protection by installing the detection sensors, position sensors or cameras outside and inside the building to reduce the blind spot. Awareness of such devices could prevent an intrusion. It is also important to have internal rules and regulations such as the use of the personal device, or retired person’s PC with data, backup data, and synchronization to the cloud may need to be deleted to maintain the security level. By outsourcing to the security company, they could secure the building after-hours.
Access Control: Physically limiting access to the area is a simple and effective way to protect. Devices like key pads, locking device, biometrics readers are some options that company could apply (MSTech Solutions, 2017). Inappropriate control is the key factor of information leakage and limiting access is effective protection method.
e.g. At my workplace, cleaning personnel has access to most of the room except for Information Technology (IT) room, where all access to the control system is located. This room is locked by a key pad.

Information
…show more content…
At my workplace, e-mail from Outlook and browsing history are monitored.

Summary Managing information security needs to have an overall balance. It cannot be just prevention, but it also needs to have detection function to review if prevention properly worked. Furthermore, detecting security incident must respond with a countermeasure to reduce damages. Cyberattack is diversifying and they operate with the aim to obtain information. It will be cost-effective and good management for a company to take the appropriate action of reinforcing IT security.

References:
Gelbstein, E. (2013). Information security for non-technical. bookboon.com.
MSTech Solutions. (2017). Enterprise Physical Security. Retrieved 3 22, 2018, from MSTech Solutions: http://www.mstech-solutions.com/enterprise-physical-security-2/
MSTech Solutions. (2017). IT Security Services. Retrieved 3 22, 2018, from MSTech Solutions: http://www.mstech-solutions.com/it-security-services-2/
Olavsrud, T. (2017, 11 20). 5 information security threats that will dominate 2018. Retrieved 3 22, 2018, from CIO from IDG:

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lock the servers into their own room with keycard or fingerprint access only. Only authorized IT staff shall have access. Management, vendors and all other authorized guest shall be escorted by an authorized IT staff member. Video surveillance should be maintained and monitored at all access…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Physical entry controls will consist of guard’s at all perimeter doors, and into all secure areas. Also a security system on all outer doors that is monitored 24 hours a day by a security company. There will also be motion sensors at all available accessible areas. There will be barbed wire around all access to first and second floor areas around perimeter fence. There will also be badges for person ale according to security level as well as guest. Also security cameras in all accessible areas with 360 degree rotation as well as nightvision.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By enabling password protection on all workstations and implementing a three try timeout/lockout on an un-successful entered password, you can protect your company from unauthorized users trying to gain access by password hacking.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Name two parameters that you can set to enhance the access control to the system.…

    • 668 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A LAN, or local area network, is a group of computers ranging from small to large within a single office or building. Security and access control has to be robust to secure data, applications, and confidential records. Unauthorized access to the network is a massive security risk for the infrastructure. One way to reduce the risk of access is to implement access doors with key cards to only allow authorized personnel. So if there was a breach in security its only limited to select personnel.…

    • 347 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Describe how an organization can properly manage its information security efforts using proper risk management techniques and cost-benefit analyses for these information security efforts.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Access Control Simulation

    • 698 Words
    • 3 Pages

    Upon entry the door was locked and a key card was required for this single point of entry. There were security cameras outside of the building. There was a dumpster outside that was not secured, which could allow anyone access to sensitive information. Locking the dumpster or placing it in a secured location would mitigate this risk. The receptionist did not ask me to verify my identity. The receptionist should be required to verify the identity of everyone entering building to prevent a person from entering the building that isn’t authorized. There was a security room with security personnel viewing the monitors. Office 1-1 had a post it note taped to computer monitor with names that could be passwords. Increased password security should be implemented to reduce the risk of someone hacking into a system. Both office 1-1 and 1-2 had fingerprint scanners, which increases access control. In office 1-2 there was an unattended paper shredder, which should be secured due to sensitive information. In the hallway there was a security camera and a utility box but the wire cabinet was not locked. As such, anyone can access the hardware inside. A lock should be installed to prevent unauthorized access to the hardware. Also in the hallway there was an Ethernet jack which allowed access to the internet. Controls should be put in place to require security access to logon to the network.…

    • 698 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Is 411 Study Guide

    • 305 Words
    • 2 Pages

    Information Security Business Challenges and Policies the mitigate risk within the 7 domains. – p 77 - 83…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Security is a compelling concern for business and employees. Employers need to establish that they carry out complete risk assessment and address security issues by implementing required security systems. Physical security system is a fundamental component of an establishment, which protects a several aspects such as building security, theft, vandalism and falsification of records. Therefore, organizations and companies need to highly aware of to protect their physical assets. The foundation of a competent security management can prevents such risk like discovering solutions, authorization, and controlling employee’s activities. As a result, organizations can ensure the safety and protection of employees and property.…

    • 1377 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Better Essays

    Disaster Recovery Plan

    • 1349 Words
    • 6 Pages

    The theft of the server physical entity needs to be addressed first, since the physical loss of equipment cannot be totally compensated for. Having a window in the server room needs to be addressed, either by closing up the wall and eliminating the window, or by using more physical deterrents such as bars on the window that cannot be removed. Physical security is first and foremost a priority. If the physical layout of the room cannot be changed, the servers and other equipment vital to the company’s continuing efforts should be moved to an inside room with a door that can be protected with an entry lock system. The servers themselves need to be protected as well, by either attaching locking mechanisms to the server cases, or locking the server racks to prevent easy theft.…

    • 1349 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Information Security

    • 2381 Words
    • 10 Pages

    Cyber-Ark’s 2012 Trust, Security & Passwords survey is the sixth in a series of annual surveys focused on identifying key security trends amongst IT workers. The survey assesses the extent to which privileged accounts and passwords are being protected in organizations today, and also provides insight into the core threats that exist and the measures being taken to defend systems. The survey report is the result of interviews with 820 IT managers and C-level professionals across North America and EMEA, primarily from enterprise companies. The security landscape continues to evolve – businesses can no longer simply focus on securing the network perimeter in hopes of keeping attackers out. As the enterprise perimeter dissolves, and reports of internal and external threats increase, privileged access points have emerged as the primary target for enterprise attacks. Privileged…

    • 2381 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    [36] Etzioni, A., The Limits of Privacy. Basic Books, New York. 1999. [37] Etzioni, A. The Common Good. Polity Press. 2004. [38] Regan, P., Legislating Privacy: Technology, Social Values and Public Policy. University of North Carolina Press, Chapel Hill. 1995. [39] Bennett, C. J. & Raab, C. D., The Governance of Privacy. Policy Instruments in Global Perspective. MIT Press, Cambridge. 2006. [40] See Warren, S. & Brandeis, L. 1890. [41] Seipel, P., Alone No More. In Bakardjiev, A. et al. (eds), Festskrift till Marianne Levin. Norstedts Juridik, Stockholm. 2008. [42] See Wisniewski, C. 2010. [43] See Thorsberg, F. 2001. [44] Bejtlich, R., The Tao of Network Security Monitoring: Beyond Intrusion Detection. AddisonWesley. 2004. [45] Gaudin, S., Intel Developing Security “Game-Changer”. Article in Network World. 26 Jan 2011. http://www.networkworld.com/news/2011/012611-intel-developingsecurity.html?source=NWWNLE_nlt_daily_am_2011-01-26 (1 Feb 2011) [46] Krautheim, J., Trusted Virtual Machine Identification (TVMI). Presentation in Xen Summit 2008 Boston, MA. 2008. http://www.xen.org/files/xensummitboston08/IdentifyingTVM.pdf (1 Feb 2011) [47] More about 2007 cyberattacks on Estonia, see http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia (1 Feb 2011) [48] More about Operation Payback, see http://en.wikipedia.org/wiki/Operation_Payback (1 Feb 2011) [49] Nygårds, O., Myndighet slår larm om it-läckor. Article in Svenska Dagbladet. 2 Feb 2011. http://www.svd.se/naringsliv/nyheter/myndighet-slar-larm-om-it-lackor_5909395.svd (1 Feb 2011) [50] More about Evercookie, see http://samy.pl/evercookie/ (1 Feb 2011) [51] More about Panopticlick, see https://panopticlick.eff.org/ (1 Feb 2011) [52] Begtrup, G. E., Gannett, W. Yuzvinsky, T. D., Crespi, V. H. & Zettl, A., Nanoscale Reversible Mass Transport for Archival Memory. Nano Letters, 9(5), pp. 1835–1838. 2009. http://www.physics.berkeley.edu/research/zettl/pdf/361.NanoLet.9-Begtrup.pdf (1 Feb 2011) [53] Fitzpatrick, M., ’Rosetta Stone’ Offers digital Lifeline. Article in BBC News. 29.7.2009. http://news.bbc.co.uk/2/hi/technology/8172568.stm (1 Feb 2011) [54] For more information, see, e.g., http://www.sap.com/press.epx?pressid=14195 (1 Feb 2011) [55] More about functional requirements for URN, see http://www.ietf.org/rfc/rfc1737.txt (1 Feb 2011) [56] Celesti, A., Villari, M. & Puliafito, A., Design of a Cloud Naming Framework. Proceedings of the 7th ACM International Conference on Computing Frontiers. CF 2010, pp. 105–106. ACM, New York. 2010. http://portal.acm.org/citation.cfm?id=1787275.1787305 (1 Feb 2011)…

    • 17037 Words
    • 69 Pages
    Good Essays
  • Powerful Essays

    Nowadays, modern companies in our country used proximity cards/access badges to maintain that only authorized employees enters the specific offices or floors of the building/company office. This helps in ensuring the security of every room and offices of the company.…

    • 1544 Words
    • 7 Pages
    Powerful Essays