Preview

IMPACT OF A DATA CLASSIFICATION STANDARD

Satisfactory Essays
Open Document
Open Document
517 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IMPACT OF A DATA CLASSIFICATION STANDARD
UNIT 1 ASSIGNMENT 2:
IMPACT OF A DATA CLASSIFICATION STANDARD

Being a mid-level financial investment and consulting firm, we are governed by laws to protect personal data of our customers. To reduce risks and threats the company needs to develop an IT Security Policy Framework that contains four main components: Policy, Standard, Procedures and Guidelines1. This report focuses on the standard by addressing the three IT infrastructure domains that are affected by the ”Internal Use Only” data classification standard of Richman Investments, where the communication of data does not leave the companies intranet2 and how each of the following IT Infrastructure domains: User, Workstation and LAN are affected by the standard.
User domain is considered the weakest link in an IT infrastructure as employees can be motivated to violate company policies. Areas of concern that can affect keeping data private, is: Lack of user awareness, because some users do not pay attention to what data is considered private and fail to secure data properly; Security policy violations, where some users continue to leave private data in the open where others can see it; Disgruntled employee purposely takes personal data to cause some sort of damage between the company and the customer; and Employee blackmail or extortion by threatening to distribute or sell the personal data in trying to obtain a promotion or monetary gain3.
Workstation domain consist of workstations (any electronic device that a user can connect to the companies IT infrastructure) to gain access to personal data using multiple resources4. The areas affected by workstations, consist of: Unauthorized access because an employee did not lock their workstation, did not log off, or their user ID and password were compromised; A virus, malicious code or malware infected the workstation from a user downloading non-business material from the internet; and a user violated the Acceptable User



Bibliography: Kim, David and Michael G. Solomon. “Fundamentals of Information Systems Security.”, 15-42. Sunbury, MA: jones and Bartlett Learning, 2012.

You May Also Find These Documents Helpful

  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Securing a user workstation with approved updates will help prevent potential system corruption and in house data from being exposed. This domain is also vulnerable and also needs constant monitoring.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3110 Quiz 6 2015

    • 600 Words
    • 2 Pages

    2. Using the USER domain, define risks associated with users and explain what can be done to mitigate them. Are related to social engineering. Users can be conned and tricked. A social engineer tries to trick a user into giving up information or performing an unsafe action. You can try to minimize these risks by raising user awareness. Implement acceptable use policies (AUPs) to ensure users know what they should and should not be doing. Use logon banners to remind users of the AUP. Send out occasional e-mails with security tidbits to keep security in their minds. Use posters in employee areas.…

    • 600 Words
    • 2 Pages
    Good Essays
  • Better Essays

    This paper will discuss a better way to control user access to data is to tie data access to the role a user plays in an organization. It will cover the value of separating duties in the organization. Then discuss the value of using roles to segregate the data and system access needs of individuals in the organization. Then describe in detail why a role-based access control system (RBAC) would be the best way to accomplish this. Finally, how to handle distributed trust management issues for users going to or from business partner networks.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Is 411 Study Guide

    • 305 Words
    • 2 Pages

    Information Security Business Challenges and Policies the mitigate risk within the 7 domains. – p 77 - 83…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    SAMPLE Security Policy

    • 3395 Words
    • 13 Pages

    References: Hausman, K., Weiss, M., & Barrett, D. (2011). Comptia security sy0-301. (3rd ed.). Pearson Education, Inc.…

    • 3395 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Cited: Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett Learning.…

    • 299 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Information Security Policy

    • 3396 Words
    • 14 Pages

    References: Merkow, Mark & Breithaupt, Jim. (2006). Information Security: Principles and Practices. Published by Prentice Hall. Retrieved August 19, 2011…

    • 3396 Words
    • 14 Pages
    Best Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    Department of Finance and Administration, State of Tennessee. (2008). Enterprise Information Security Policies. (Document Version 1.6)…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    Protecting sensitive or confidential data is paramount in many businesses. In the event such information is made public, businesses may face legal or financial ramifications. At the very least, they will suffer a loss of customer trust. In most cases, however, they can recover from these financial and other losses with appropriate investment or compensation…

    • 548 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    For the Past 15 years, I have been supporting small businesses with computer problems, ranging from desktop support to network and server integration. I have been a Microsoft® Certified Professional since 1999, and a Microsoft® Certified Small Business Specialist for over a year. I ran my own company, Lyons Den Computer Services, Inc., from 1992-2007. I exclusively serviced businesses with 3-25 workstation and servers. I recently started a new position where I am working with even larger organizations, with over 100 computers per location. One thing most of these companies have in common is a great dependence on technologies such as the internet, email and network connections to the world. Unfortunately, another thing they have in common is a lack of understanding of the depth of security concerns they create by taking advantage of these technologies. One of the largest security holes is often not a missing piece of hardware or software, but a missing piece of documentation that should be in place to protect their investment in all their equipment, personnel and good company name. I am referring to an Acceptable Use Policy for their network and Internet usage.…

    • 2473 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Adopting advanced information technologies within the present broad application fields requires precise security. However, security problems regarding information privacy have occurred frequently over the last 5 years despite the contribution of these technologies. To respond to the need for securing information privacy, the Information Privacy Law was enacted on April 1, 2005 in Japan. One of the responses to this law enforcement is demanding a higher level of information risk management and search for more effective tools to be used for identity protection and problem-solving. Two examples of these tools include RAPID and IRMP. However, there is no established system-development model for either of these tools. Further developments to improve the RAPID and IRMP remain as new challenges. In this thesis, a new approach on developing a system security model to be used for information risk management is proposed. To demonstrate this approach, the object-oriented language is used.…

    • 30867 Words
    • 124 Pages
    Satisfactory Essays