With business always changing and data always needing to be protected, it has become an issue to determine the level of security for confidentiality and integrity purposes while allowing it all to be properly available for use. To put Global in front of the competition with its customers it implements its Global Connect-Link for collaboration. Through the use of its security division, CIS, Global prioritizes its data according to the risk of activity of usage against the potential business reward. It conducts constant supervision and monitoring to maintain confidentiality, integrity and availability. Global also has its own Continuity Manager software to manage large amounts of external users while maintaining the necessary centralized security from unauthorized access. Another level of security Global offers is its DLP or data loss prevention product. This keeps all data whether structured or unstructured when in motion or at rest from being compromised and deleted. Lastly in regards to Global’s controls and the documentation of the effectiveness of these controls, CompScan, an audit program is in place to collect and analyze all the data.
The overall analysis of Global is that they seem to have a good grasp on keeping all data protected for confidentiality purposes, allows for the transferring of the data to be done securely for integrity purposes and gives it customers, partners, employees and suppliers proper access to all data based on privileges for availability purposes. The only weakness that may exist is the proper training for its employees on all that Global offers. With such incredible software support and ability to provide security without worry it will have to maintain constant training to make sure that simple human error doesn’t become an issue but if something were to happen then the proper steps are taken and followed to avoid corruption from taking place.
When it comes to the reporting of is financial data certain policies and procedures must be followed accurately. With an insecure system the opportunity of having inaccurate financial data reported is a good likelihood. Federal laws require that financial data of any sort be kept private and secure at all times whether at rest on the network or in transit when being viewed or sent to a fellow business entity.
The use of the security division’s IRM or information risk management has had a great influence on its ability to maintain business and get the edge on its competitors. The use of its Connect-Link, its prioritizing of security on investments, its Continuity Manager, its data loss prevention product and its CompScan it’s easy to see why peace of mind is something that is Global can offer at a 95% success rate.
To solve the internal problems like employee training, Global can hire a outside company to come in on a basis determined by the security division and conduct classes to make sure all employees are up to date on proper procedures and understanding of keeping security at the top of their own priority list. Maintaining good training programs minimizes the risk of user errors but doesn’t completely eliminate them. Adding other security like anti-virus software to the workstations and closing off ports that are not in use on a regular basis will also help ensure a higher percentage of user compliance to following the rules and policies in place.
You May Also Find These Documents Helpful
-
By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…
- 313 Words
- 2 Pages
Satisfactory Essays -
The purpose of this risk assessment is to evaluate the adequacy of the Global Finance, Inc. security and network. This risk assessment provides a structured qualitative assessment of the operational environment. It addresses sensitivity, threats, vulnerabilities, risks and safeguards. The assessment recommends cost effective safeguards to mitigate threats and associated exploitable vulnerabilities. Safeguards are security features and controls that, when added to or included…
- 2659 Words
- 9 Pages
Powerful Essays -
The network diagram of Global Finance, Inc. (GFI) depicts the layout of the company’s mission critical systems. The company has two servers (Email and the Oracle database) which are used more than any of their other systems. GFI heavily depend on their network to be stable because of their financial systems that are running and any outage would negatively affect their operations and financial situation. Like all other business, customer satisfaction and the security of GFI’s network is crucial. In order to ensure their network and data is secure, GFI has begun to re-evaluate their network infrastructure. GFI has had some service interruptions that has cost them over $100,000 in revenue losses.…
- 887 Words
- 4 Pages
Powerful Essays -
Scenario 1: (DAC) Discretionary Access Control. Being that the business is small and not in need of higher security measures, it would be the easiest to maintain and monitor for a small business.…
- 286 Words
- 2 Pages
Satisfactory Essays -
Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…
- 2606 Words
- 11 Pages
Powerful Essays -
Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…
- 1681 Words
- 7 Pages
Better Essays -
operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…
- 349 Words
- 2 Pages
Good Essays -
This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…
- 801 Words
- 4 Pages
Good Essays -
Information technology has become spreading widely throughout our society. We live in a modern world with Internet access from our home, fast food chains, offices, schools and on our mobile devices, such as iPhones, iPods, Blackberries and Android Phones. Nowadays, the use of internet became essential to communicate distantly and the use of social medias for interactions as well as businesses through online marketing or other called as the e-commerce. The rapid advancement of this system has elevated the importance of the IT function. Information technology in the modern enterprise has developed gradually from a back-office component to a most important operational constituent that could improve businesses performances and increases shareholders value. Enterprises such as marketing, sales and finance are now cooperated by information technology. The core success of an organization is information technology because it serves daily operational support and enables enterprise wide change. Since information technology is essential in a modern enterprise it is sometimes serve as a threat in today’s organization. One of the examples is the personal information which can be sending through the use of systems and it can be a threat if this information consolidated from banks and accounts pertaining to financial aspects. In these cases, applying triad could be helpful that is Confidentiality, Integrity and Availability. The protection of the information from disclosure to unauthorized users is confidentiality while integrity refers to protecting information from being modified by unauthorized users. Ensuring that authorized users are able to access the information when needed is availability.…
- 277 Words
- 1 Page
Satisfactory Essays -
Ensuring proper level of security is important for a business because it is crucial to the operations. The business must protect the valuable asset, confidential information pertaining to trade secrets, financial data, product development, business strategy, and customer’s information. Inadequate security could result in legal liability and demise of business. Strong security and control can result in an increase of employee productivity and lower operational costs. Some tools available to prevent breaches are firewalls, intrusion detection, and antivirus software.…
- 369 Words
- 2 Pages
Good Essays -
Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…
- 1434 Words
- 6 Pages
Powerful Essays -
An access control system is fundamental in reducing security issues as well as controlling the personnel allowed to access a given place. Its main objective is to ensure limited persons are granted the rights of access. This access can be granted by checking on criteria such as workplace, home or any other specified locations. The access control system may consist of diverse components that collaborate to ensure the main objective is achieved. An effective control system would ensure privileges for the different users vary according to their access rights or levels; the system under research can monitor and record all activities of access, lock and unlock the doors, cancel privileges when a pass card is lost as well as detect usage of canceled cards (Benantar, 2006).…
- 1220 Words
- 5 Pages
Powerful Essays -
In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…
- 2531 Words
- 11 Pages
Better Essays -
Global Limited is a global provider of infrastructure information systems, whose services cater to a wide range of industry sectors. One of Global Limited’s business objectives is information security for their clients. In order to provide their clients with information security, Global Limited has utilized a risk management approach to protect their client’s information.…
- 515 Words
- 3 Pages
Good Essays -
Compare and contrast access control models. Select an access control model that best prevents unauthorized access for each of the five scenarios given below. Which types of logical access controls should be used in each scenario? Justify your recommendations.…
- 457 Words
- 2 Pages
Satisfactory Essays