Preview

Data Security, Quality, and Integrity-Regulations and Information Classification

Good Essays
Open Document
Open Document
1069 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Security, Quality, and Integrity-Regulations and Information Classification
Regulations and Information Classification One very important task in defining the needed security for a system of data is first to understand the nature of that data and how it is used in a given system. Within any given organization there is a myriad of data that can all be categorized in a different way. We can use this opportunity to discuss the sensitivity of data within our organization and then break it into appropriate classifications to be used when implementing security measures. Additionally, this process will help the organization to conform to the ISO standards the company may be subjected to, in this case, ISO/IEC code 18028. This also directly relates to certain laws that also pertain to the security of information and finally how the organization will be able to test and measure how well these security practices are implemented and followed. Lastly, we can outline here how controls can be created and implemented to enforce these requirements as well as how auditing can validate the effectiveness of these implemented controls. As we begin this analysis, we look to classifying the data we possess. We know that data strategies differ from one organization to the next due to the fact that each organization generates its own different types and volumes of data. Most experts advise that companies classify their data in accordance with their confidentiality requirements in an effort to add more security for increasingly confidential data. For instance, salary information within the organization, if leaked, can be externally damaging, but also very internally sensitive. That being said, there are other forms of data within the organization that really have no security concern at all, for instance, the mass memo stating that the north door of the facility will be under repair next Wednesday or the marketing director will be out of town the third week of next month. This brings us to the concept of tiered data storage. Once data

You May Also Find These Documents Helpful

  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 3 Assignment 3

    • 288 Words
    • 1 Page

    Data classification policy is important for securing data from risks, which includes unauthorized users, modification, disclosure, access, use, and removal. This is to ensure protection on data assets from unauthorized users. Data must be maintained in a secure, accurate and reliable manner and be available for authorized use. In order to implement security measures, the data must be classified into categories like; confidential, restricted, and public. Confidential and restricted will be required some sort of access mechanism to authenticate anyone who wants to access any classified documents. In order to construct a Classification policy, one must know what type of data are available, where they are located, what type of access levels are implemented and what protection level is implemented and does it adhere to compliance regulations.…

    • 288 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Data Classification Standards help Richman Investments to consistently define how this organization should handle and secure our various types of data. This report will focus on the internal use only data and how each of these domains are affected by these standards. Internal use only data refers to information that may or may not be confidential. It is imperative that our organization keep this information in house and away from the public and realize the Domains that need to be addresses with these rigid standards. The three standards that are at the top of the list for our company that will be directly affected are the User, Work Station, and LAN Domains.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Good Essays

    A LAN, or local area network, is a group of computers ranging from small to large within a single office or building. Security and access control has to be robust to secure data, applications, and confidential records. Unauthorized access to the network is a massive security risk for the infrastructure. One way to reduce the risk of access is to implement access doors with key cards to only allow authorized personnel. So if there was a breach in security its only limited to select personnel.…

    • 347 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In this document I will be discussing the laws that are related to security and privacy of datas, I will explain how they relate to the security and privacy of data.…

    • 1633 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Two key components of maintaining confidentiality are the integrity of information and its security. Integrity is achieved by the accuracy and completeness of information using proper processing methods. Security measures are needed to protect information from a wide variety of threats.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Classified data in this category is for internal use only. Any release which must be approved prior to releasing or disclosing. Outside the company Its compromise may inconvenience and aserious breech in trust and damage to the company. But this type of data is unlikely to result in a breach of confidentiality, loss of value or serious damage to integrity.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    This paper gives an idea regarding the important aspects of the database security. It mainly focuses on the security parameters such as confidentiality, authenticity and availability of the data. It also explains the different threats for the security in an organization in relation to the database. The basic steps which are required to control the loss of data are explained in detail. Among the controls the encryption process is the one which has to be followed to control the access into an…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Input Controls

    • 1029 Words
    • 5 Pages

    This paper will discuss input controls and their various functions. An input control includes the necessary measures to ensure that data is correct, complete, and secure (Shelly & Rosenblatt, 2012). Input controls as it relate to user interface, includes audit trails, password security, data security, and encryption (Shelly & Rosenblatt, 2012). It is vital a company should take all needed measures to protect its data, which include customer, employees, and suppliers. Most assets have a value, but corporate data is priceless, because without safe, secure, accurate data, a company cannot function. (Shelly & Rosenblatt, 2012).…

    • 1029 Words
    • 5 Pages
    Better Essays
  • Better Essays

    1.2Legal requirements and codes of practice: issues relating to the legal requirements for secure recording of information eg the common law duty of confidence, the legal requirements for accuracy of information and for information to kept up-to-date, obtaining personal data only for specific, lawful purposes and for personal data to be relevant and not excessive for its purpose; issues relating to the legal requirements for the secure storage of information eg the legal requirements that personal data should not be kept for longer than is necessary for its purpose, security measures to protect against the accidental loss, destruction or damage to personal data, legal requirements for the storage of electronic and manual data and access to secure information; issues relating to the legal requirements for sharing information eg…

    • 1407 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Chartered Institute Of Personnel And Development, 2009. Data protection. [online] Available at: www.cipd.co.uk/onlineinfodocuments/atozresources.htm [Accessed 24 February 2013]…

    • 1119 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Analysis Memorandum

    • 1519 Words
    • 7 Pages

    This is an analysis memorandum proposing the use of Microsoft Access databases within our Security Division’s infrastructure. Many security managers are relying heavily on the use of Microsoft Excel spreadsheets in order to keep track of their personnel, security violations, inspection programs and training. While spreadsheets are effective means for complex calculations they are also limited in that they basically fall short in showing the relational qualities of security data in relationship to particular fields and queries. Not only do they fall short in relational quality, but they are also very difficult query in order for the user to locate particular records without having to go through entire spreadsheet.…

    • 1519 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    • Describe the standards, best practices and terms for development and support of systems. This document should outline the roles and responsibilities, approach for planning and management across the SDLC, and include templates for analysis of data privacy and retention.…

    • 787 Words
    • 4 Pages
    Good Essays

Related Topics