Preview

BSA/310

Good Essays
Open Document
Open Document
674 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
BSA/310
Control Types
Michael Thompson
BSA/310
October 25, 2013
Jack Davis

Control Types
In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:
Threats |Confidentiality |Integrity |Availability | |Denial of Service Attack |Low |Medium |High | |Power Supply Failure |Low |Low |High | |Malicious Code Infection |High |High |High | |Theft and Fraud |High |Medium |High | |Website Intrusion |High |High |High | |Unauthorized Data Access |High |High |Low | |The small business and companies should address and take care of the security holes and threats, and it should not be necessarily a complicated and costly process. The small business and companies need to have information security, for the following reasons:
If this compromise, the company reputation is at stake.
-The company may lose millions or even billions of dollars, and the reputations will be lost. Clients



References: Kawamoto, Dawn. (2007). “TJX says 45.7 million customer records were compromised.” Cnet.com. March 29, 2007. Retrieve at: http://news.cnet.com/2100-1029_3-6171671.html Lee, R Daniel. (2001) “SANS Institute InfoSec Reading Room: Developing Effective Information Systems Security Policies.” SANS Institute. Retrieve at: http://www.sans.org/reading_room/whitepapers/policyissues/developing-effective-information-systems-security-policies US-Cert. (2005). “Malware Threats and Mitigation Strategies.” US-Cert White Paper. May 16, 2005. Retrieve at: http://www.uscert.gov/sites/default/files/publications/malware-threats-mitigation.pdf

You May Also Find These Documents Helpful

  • Good Essays

    Bsa 310 Kudler

    • 1230 Words
    • 5 Pages

    The Kudler frequent shopper program is a new program that the company is initiating to help with tracking customer spending behavior and also to increase customer loyalty. According to Kudler Fine Foods (2004), “The customer purchase behavior patterns will help Kudler refine its processes and offerings to best satisfy their valued customers, (Sales and Marketing, para. 3). Kudler’s customers are so much concerned with the price of the products they are purchasing so it is important that they are able to receive the highest quality products available to them, so they may create all of the wonderful dishes they are used to eating. The frequent shopper program will also benefit the customers by allowing them to earn points for things like airline ticket upgrades, special gifts, and even specialty food products. This program is all about customer information and the management of that information so that Kudler can better “delight” their customers and increase revenue. The sales and marketing team will work to establish and sustain the frequent shopper program by the fourth quarter so that revenue is increased by 4.75% by that time as well. To do this successfully it is imperative that Kudler consider all areas including any legal, ethical, and security areas that may be impacted by the program.…

    • 1230 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Bba 290

    • 418 Words
    • 2 Pages

    | Which of the following transactions would not be shown under the operating activities category of the Statement of Cash Flows (using the direct method):Answer…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. In computing, e-Business, and information security, it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine. It is also important for authenticity to validate that both parties involved are who they claim they…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    Small businesses, all organizations should begin investing in new technology to protect their databases and information. Horton’s article goes over multiple different options to avoid cyber-intrusions. For example “layering” encryption and tokenization, updated POS systems, and contracted penetration tests. By focusing on these three areas of a company’s information security infrastructure, you…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bsa310

    • 332 Words
    • 2 Pages

    I don’t think that it makes sense to look at an organization as a whole in terms of these levels, as all businesses will always be partially in each of these states.…

    • 332 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Final Project

    • 4129 Words
    • 13 Pages

    An effective IT Security policy protects the organization against possible threats to the infrastructure and data that the organization has. It will provide and maintain its ability to provide confidentiality, integrity, availability, and security of the client’s data within the organization’s environment.…

    • 4129 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    bsa 310 syl

    • 1960 Words
    • 8 Pages

    Armstrong, G., & Kotler, P. (2011). Marketing: An introduction (10th ed.). Boston, MA: Prentice Hall.…

    • 1960 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    In this assignment I will be explaining the issues and constraints in relation to the use of business information in Asda. I will be outlining the operational issues within the company.…

    • 1048 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Bshs 311

    • 258 Words
    • 2 Pages

    References: Bosworth, Olsen, & Zimmerman (March 1, 2000). American Academy of Family Physicians A 'Stages of Change ' Approach to Helping Patients Change Behavior. Am Fam Physician 2000;61:1409-16.…

    • 258 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Security Awareness Policy

    • 1733 Words
    • 3 Pages

    with IS security policies by signing a compliance agreement that is retained in their personnel…

    • 1733 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Bba 310

    • 526 Words
    • 3 Pages

    In a management position of a company, there are many different strategies for hiring individuals for different types of positions. Each manager develops a commonality of the type of people they are looking for. In the case study of Mr. Guy Kawasaki, he touches on his different methods for hiring diverse prospects, including some of the mistakes he has made and what to do different not to repeat the same mistakes. Rather than hiring individuals who are very knowledgeable about the position at hand, he more looks to recruit people who learn how to learn, becoming more effective over time.…

    • 526 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    Information technology has become spreading widely throughout our society. We live in a modern world with Internet access from our home, fast food chains, offices, schools and on our mobile devices, such as iPhones, iPods, Blackberries and Android Phones. Nowadays, the use of internet became essential to communicate distantly and the use of social medias for interactions as well as businesses through online marketing or other called as the e-commerce. The rapid advancement of this system has elevated the importance of the IT function. Information technology in the modern enterprise has developed gradually from a back-office component to a most important operational constituent that could improve businesses performances and increases shareholders value. Enterprises such as marketing, sales and finance are now cooperated by information technology. The core success of an organization is information technology because it serves daily operational support and enables enterprise wide change. Since information technology is essential in a modern enterprise it is sometimes serve as a threat in today’s organization. One of the examples is the personal information which can be sending through the use of systems and it can be a threat if this information consolidated from banks and accounts pertaining to financial aspects. In these cases, applying triad could be helpful that is Confidentiality, Integrity and Availability. The protection of the information from disclosure to unauthorized users is confidentiality while integrity refers to protecting information from being modified by unauthorized users. Ensuring that authorized users are able to access the information when needed is availability.…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    “ A security policy should fulfill many purposes. It should: protect people and information; set the rules for expected behavior by users, system administrators, management, and security personnel; authorize security personnel to monitor, probe, and investigate; define and authorize the consequences of violation; define the company consensus baseline stance on security; help minimize risk; and help track compliance with regulations and legislation.” Hurwicz, Michael (2002, February 01).…

    • 3909 Words
    • 16 Pages
    Powerful Essays