Preview

Safeguarding Personal and Organization Data

Good Essays
Open Document
Open Document
338 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Safeguarding Personal and Organization Data
Last year there were several high profile cases including General Electric, Starbucks, Ford and the Veterans Administration that involved the loss of personal information from hardware devices, in particularly the laptop. The very nature of the laptop (as well as other highly portable hardware devices) increases the likelihood of them being stolen or lost.
Hardware that is stolen or lost (including optical discs, hard drives and tapes) are always disconcerting however, with tremendous amounts of data at risk losses can be disastrous resulting in the high-cost of hardware replacement, legal ramifications/liability, unscheduled administrative costs, damaged corporate/personal credibility, terminations, reduced employee morale and unremarkable company productivity.
Thus, it should not be surprising that in 2006 more than 50 Million Americans have had personal information compromised due to unforeseen security breaches such as these (Bigelow, 2006). Personal and organizational data must be safeguarded from unwanted intruders, hackers and thieves.
Given the potential corporate/organizational risks that these problems pose it is anticipated that businesses and organizations will be searching for state-of-the-art measures to safeguard their data which includes Disk Encryption.
Simply put, Encryption is a technique which makes plain data indecipherable. It begins by processing data through a multifaceted mathematical algorithm which uses a distinctive key value to produce unique encryption results. Longer keys which are used in conjunction with more complex encryption algorithms result in encrypted data (which is nearly impossible to recover without the use of a key).
Only after the data is in an unreadable form is it then considered safe regardless if the files are compromised by crackers/hackers or stolen. Encrypted data is decrypted or made readable once more by processing it through the algorithm using the same key or a companion key thus protecting the



References: Bigelow, S. (2006). Tape and Disk Encryption Product Roundup. Retrieved May 18, 2007, from http://searchstorage.techtarget.com/originalContent/0,289142,sid5_gci1173496,00.html

You May Also Find These Documents Helpful

  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothern, C., (2011). Comp TIA Security + (3rd ed.). Retrieved from The University of Phoenix eBook.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Mutandum Corporation Case

    • 963 Words
    • 4 Pages

    While Mutandum’s current method of tracking computers (attaching assigned, unique tracking numbers directly to the equipment) is effective, it must be applied to all systems, regardless of the asset’s value at the time of purchase. The system itself is not what these unique tracking numbers are protecting, but rather the sensitive data stored on…

    • 963 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 7 Exercise 1

    • 641 Words
    • 3 Pages

    Although it is extremely efficient in 128-bit form, AES also uses keys of 192 and 256 bits for heavy duty encryption…

    • 641 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Encryption is the process of transforming normal content, called plaintext, into unreadable gibberish, called ciphertext.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    it 208

    • 407 Words
    • 2 Pages

    I am writing to you to inform you about potential cost saving move our company needs to consider. As IT director I have found time and time again. We are spending tons of money on Replacement DVD-Roms, DVD's, Storage space to house these disk, security for these disk. I also see a security risk for losing this data. I have Done some research to fined a cost saving move this company could make so solve these issues. My solution: External Mass Storage Devices. This is in the means of USB Thumb drives or portable hard drives. Both hold tons of data. USB Thumb drives come in full range of sizes. Today I carry a 32 GB drive that houses all most anything I will ever need on my to contain data. I would recommend or company to quit spending money on DVD drives and replace them with USB Drives for portable exchangement of data around the company. We can encrypt these drives for security, place RDIF chips for tracking just like our name badges, and price per GB is nearly half at first we purchase them, but with the reliability of theses drives there wont be replacements made from failure. No more scratch Disk. I also recommend 1TB USB external hard drives for back up of data for all portable computers in our company for those that work out side of our office. Please put this into consideration when budging for the next quarter. If we were to 100 USB drives of the office it would cost us around $ 1,000.00. We are spending $35.00 on Dual Layer DVDs per person per month. This is costing us $3,500.00 per month. I also spent $600.00 dollars last quarter on DVD drives. I wanted you to look at USB Back Up Drives. I found this: WD My Passport Air 1TB All Metal USB 3.0 Ultra-slim External Portable Hard Drive Storage. This will do the job and has enough room for extra space when needed. This would cost us $130.00 each, at 20 people needing these it would run us $2,600.00. this would make our total $3,600.00 dollars for the next quarter with no…

    • 407 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ethics Of Dumpster Diving

    • 396 Words
    • 2 Pages

    Based on the nature of the disposal, a computer hacker may acquire an array of details and information from improperly disposed materials and equipment, such as electronic equipment and computers. For example, if a computer is not properly wiped and securely disposed of, computer hackers who obtain such may be able to recover any and/or all data…

    • 396 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Physical Security

    • 272 Words
    • 2 Pages

    This paper is to outline Riordan Manufacturing’s existing Information Security Systems, determine their weaknesses, and develop solutions to those weaknesses by addressing security issues in the areas of physical, network, data, and the web.…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Chapter 6 Case Study

    • 1093 Words
    • 5 Pages

    A recent incident involving hacking and data theft prompted the implementation of a new data security system at Listo Systems. A “black box” system will be installed on every PC in the company and will not only affect the way data moves but also who has access to sensitive files. Nearly everyone at Listo Systems will be doing things very differently once the black boxes are in place.…

    • 1093 Words
    • 5 Pages
    Good Essays
  • Better Essays

    The day of September 24, 2010, an unidentified individual walked into Urology office at the Henry Ford Health Systems hospital, the door was unlocked. A laptop was stolen, but it did have password protection software, the protection it provided was not to complex a person that had advanced knowledge of computers will still be a threat. The information that was stored on the laptop did not provide…

    • 1028 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Security Awareness Policy

    • 1733 Words
    • 3 Pages

    with IS security policies by signing a compliance agreement that is retained in their personnel…

    • 1733 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Social Engineering

    • 1041 Words
    • 5 Pages

    The article Social Engineering Foundamentals: Hackers Tactics (Granger, 2001) shows that attacks can be carried out in both physical and psychological forms and can involve physical intrusion into the work place, over the phone and collection of trash (a.k.a Dumpster diving). Items found such as documents and outdated or broken hardware components may contain crucial information which can be use to carried out…

    • 1041 Words
    • 5 Pages
    Good Essays
  • Good Essays

    6th Sense Technology

    • 951 Words
    • 4 Pages

    * Cryptosystem (Cipher System) – method of disguising messages so that only certain people can read them…

    • 951 Words
    • 4 Pages
    Good Essays
  • Better Essays

    cryptography

    • 2454 Words
    • 10 Pages

    Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense. The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted persons to do the same. Since World war and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread.…

    • 2454 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Following the recent data leakage from the Hale firm I suggest that cryptography is used as a prevention measure to avoid similar issues. Business relies to certain extent on mobile technology and portable storage devices to communicate and exchange data faster and easier. Encrypting data is very efficient method to protect sensitive information. In such a merger it is important to keep a safe internal network and synchronised antivirus software on all devices and components. As well as keeping patches of used applications up to date. “Patch or mitigate within two days for high risk vulnerabilities. Use the latest version of applications.” (AUS Government). It is important to minimise the number of users with administrative privileges until an efficient network is driven through all devices. Only people who are in need of information about an ongoing case should be permitted to access any sensitive data and even that must be done under after an administrative permission of a higher executive. Consumerisation of IT must be brought down to a minimum of only in-office desktop devices usage until everyone is generated an appropriate username and password for the company network access.…

    • 2943 Words
    • 12 Pages
    Powerful Essays