Security Requirements & Possible Risks

Topics: Computer security, Security, Password Pages: 4 (1330 words) Published: February 27, 2013
Security Requirements and Possible Risks: Benefits Elections System Angela Nelson
February, 25, 2013
James Summerlin

Security Requirements and Possible Risks: Benefits Elections System
Huffman Trucking, an established trucking company since 1936, has recently requested the implementation of a new Benefits Elections System to assist management in tracking and reporting the benefits of both union and non-union employees. A database system will be utilized to store critical data such as employee information, along with the benefit package of their choosing. Storing such information requires necessary security measures to be in place to ensure the total protection of the data within. The risks associated with storing critical information must also be thoroughly addressed so Huffman Trucking can develop effective action plans to prevent potential threats from harming the organization. Regardless of the storage method when handling critical information, security measures must be implemented to effectively protect the data, as well as the company assets from potential threats such as theft or litigation. Security Requirements

When it comes to effectively protecting company data, any organization has the great responsibility to identify as well as implement security policies, values, strategies, processes, procedures, and best practices to fully ensure data protection, as well as ensure that organizational goals and objectives are continually being met (Reiner, 2008). The information that will be stored within the Huffman Trucking database will include: employee names, social security numbers, birthdates, etc. The loss of such data can ultimately not only harm the employee, but the organization as a whole. In an effort to reduce and/or eliminate such risks, security requirements for the Benefits Elections System should include: firewall security, encryption, and password protection and renewal.

Firewall security is an absolute necessary...

References: Brown, T. (2010). Protecting Organizations’ Most Critical Data with Privileged Password Management. New York, NY: Auerbach Publications .
Dell. (2013). Retrieved from
Mulvey, A. (2006). Q&A Database Corruption. Retrieved from
Reiner, J. (2008, April). Anchor Your Information Security Program. Information Security Program Guide for State Agencies, 26(3), 20-39.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • information systems risk and security Essay
  • risk Essay
  • Information Security Risk Analysis and Management Essay
  • E-Commerce Security Risks Essay
  • Security Risk Associated with Mobile Devices Essay
  • Security and Graded Assignment Requirements Essay
  • Risk management
  • Security Risk Management Essay

Become a StudyMode Member

Sign Up - It's Free