Security Requirements and Possible Risks: Benefits Elections System Angela Nelson
February, 25, 2013
Security Requirements and Possible Risks: Benefits Elections System
Huffman Trucking, an established trucking company since 1936, has recently requested the implementation of a new Benefits Elections System to assist management in tracking and reporting the benefits of both union and non-union employees. A database system will be utilized to store critical data such as employee information, along with the benefit package of their choosing. Storing such information requires necessary security measures to be in place to ensure the total protection of the data within. The risks associated with storing critical information must also be thoroughly addressed so Huffman Trucking can develop effective action plans to prevent potential threats from harming the organization. Regardless of the storage method when handling critical information, security measures must be implemented to effectively protect the data, as well as the company assets from potential threats such as theft or litigation. Security Requirements
When it comes to effectively protecting company data, any organization has the great responsibility to identify as well as implement security policies, values, strategies, processes, procedures, and best practices to fully ensure data protection, as well as ensure that organizational goals and objectives are continually being met (Reiner, 2008). The information that will be stored within the Huffman Trucking database will include: employee names, social security numbers, birthdates, etc. The loss of such data can ultimately not only harm the employee, but the organization as a whole. In an effort to reduce and/or eliminate such risks, security requirements for the Benefits Elections System should include: firewall security, encryption, and password protection and renewal.
Firewall security is an absolute necessary...
References: Brown, T. (2010). Protecting Organizations’ Most Critical Data with Privileged Password Management. New York, NY: Auerbach Publications .
Dell. (2013). Retrieved from http://www.secureworks.com/resources/articles/other_articles/firewall-security/
Mulvey, A. (2006). Q&A Database Corruption. Retrieved from http://www.quickanswer.com/corrupt.htm
Reiner, J. (2008, April). Anchor Your Information Security Program. Information Security Program Guide for State Agencies, 26(3), 20-39.
Please join StudyMode to read the full document