What are the risks of copying the database to the laptop and taking it home or on a trip?
The most obvious risk associated with copying the database to her laptop are related to security. Here, here laptop may not have the same security provision as the retail company that employs her. Likewise, data during the transfer process can be compromised depending on when and where she conducts the transfer. For example, Wi-Fi networks themselves are very vulnerable to nefarious acts. For examples hackers have been know to intercept Wi-Fi to connect their own device. In addition, hackers can access the Wi-Fi network and thus gain access to connected devices. This is can particularly dangerous as not only does the hacker have access to the database via Jackies laptop, they could potentially have access to other pertinent customer files and information. This information can then be compromised, sold on the black market, or used as a means to steal from unsuspecting customers (Chi, 2017).
In addition, the laptop itself can be stolen. This is particularly true if Jackie has lax standards related to her laptop security. For instance, while out of town, Jackie could leave her...
…hackers continues to improve with our ability to counteract them becoming much less consistent. As such, the chances of having the data at risk can vary depending heavily on the actions of Jackie as it relates to copying the database. Using public wi-fi, leaving the laptop in highlight trafficked areas, or traveling to a country with high crime all place the data a risk. Here, the risk is much higher relative to leaving the data within the retail organization itself. As such the chances of compromise are low, but should still be avoided as the fallout associated with a data breach…
References
1. Chi, M. (2017). Big data in national security. Australian Strategic Policy Institute. http://www.jstor.org/stable/resrep04118
2. Dudash, S. C. (2016). Data Security Regulations/Standards. In The Department of Defense and the Power of Cloud Computing: Weighing Acceptable Cost versus Acceptable Risk (pp. 13–17). Air University Press. http://www.jstor.org/stable/resrep13826.12
3. Voss, W. G., Woodcock, K., Dumont, D., Wells, N. D., Exor, J. I., Traça, J. L., Embry, B., & Khan, F. (2012). Privacy, E-Commerce, and Data Security. The International Lawyer, 46(1), 97–112. http://www.jstor.org/stable/23827353
Company's Data Needs Data protection is an important aspect of modern day businesses and organizations because data is the lifeblood of their business and operations. Some of the major examples of a company's data include financial information, legal records, and customer information. Given the significance of this type of information, it is increasingly critical for a company to protect its data in order to guarantee successful operations. In the recent past,
Security and Privacy Five Central Concerns About Data Security and Privacy The five central concerns about data security and privacy that are the most common in personal and business use of computers are presented in this paper. Password security, the need companies have to keep their employees up-to-date with security training, and defining checks and balances to make sure information is not compromised are the three most important according to research.
Internet Risk and Cybercrime at the U.S. Department of Veterans Affairs Internet Risk Cybercrime Today, the mission of the U.S. Department of Veterans Affairs (VA) as taken from President Lincoln's second inaugural address is, "To care for him who shall have borne the battle, and for his widow, and his orphan." To this end, this cabinet-level organization provides healthcare services through the Veterans Health Administration (VHA) to nine million veteran patients each year.
It's a tidal wave that's going to engulf us all within the next five years. Cloud services will be a $160 billion industry by the end of 2011" (Ginovsky 2011, 21). Although the decision to transition from a traditional approach to cloud computing will depend on each organization's unique circumstances, a number of general benefits have been cited for those companies that have made the partial or complete transition to
Cloud computing presents and represents a large amount of opportunity to expand and improve the manner in which information systems, computing and usage of internet technology is managed. However, as recent hacks and exploits have pointed out, cloud computing is far from a panacea and presents a large amount of new problems due to hackers, thieves and opportunists using the new technology to find new ways to victimize and snoop
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now