Verified Document

Security Implementation Business Proposal

¶ … Room With a View Enterprise Risk Assessment

The principle risk associated with the Data Security Coordinator and his or her role in the security plan is in properly training employees and selecting the proper service providers. Additionally, it is necessary to continually monitor and evaluate the progress of service providers to ensure that they are compliant with both enterprise and industry standards. Internally it is necessary to ensure that there is a set period of no more than a month for which passwords must be changed. Personal information should be accessible only to the Data Security Coordinator and to C. level employees. An orderly, formal procedure needs to take place for de-provisioning terminated employees in which they provide access to all of their data and have all of their employee access denied. Risk assessment for external risks includes evaluating and monitoring the progress of the service provider responsible for provisioning the company's firewall. Additionally, depending on the efficacy of encryption methods, data masking may be needed to augment the aforementioned method. User authentication is a point of risk that can ideally be solved with a two-pronged authentication method, such as which is provided by "Google's Authentication platform" (Harper, 2014). Data protection...

A checklist should be created for doing so, as well as for evaluating the processes and procedures of service providers. Auditing the internal risks aspect of this security plan will involve checking records to determine when passwords for all employees were changed and if those changes were made on schedule. It will also require denoting if there are any reports of unauthorized customer information. To audit external risks, the auditors will need to see if relevant data has been encrypted or masked, which will purportedly require the 'keys' to these methods. The access control measures and the authentication profiles (the latter of which should utilize a dual identification approach) can be audited by having employees utilizing them, and testing their accessibility without employees entering the correct information. External threats can be audited by testing the validity of the security…

Sources used in this document:
References

Harper, J. (2014). Data replication: The crux of data management. www.dataversity.net Retrieved from http://www.dataversity.net/data-replication-crux-data-management/

Harper, J. (2014). Cloud data protection. www.dataversity.net Retrieved from http://www.dataversity.net/cloud-data-protection/
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Implementation of Microsoft Windows
Words: 1851 Length: 6 Document Type: Research Proposal

Window Security Implementation Scenario NextGard Technologies specializes in the network consulting services for small, medium and large organizations inside and outside the United States. Currently, NextGard has approximately 250,000 employees in 5 countries and the company corporate headquarter is located at Phoenix, AZ. However, the company decides to secure and upgrade its current network to enhance organization efficiencies. Currently, the company has 5 district offices at the following locations: New York City, New

Security Implementation of
Words: 3464 Length: 10 Document Type: Capstone Project

Information System Security Plan The information security system is required to ensure the security of the business process and make the confidential data of the organization secure. The organization's management is required to analyze the appropriate system to be implemented and evaluate the service provided on the basis of their required needs. The implementation of the system requires the compliance of organizational policies with the service provider to ensure the maximum

Information Technology IT Security Implementation
Words: 3195 Length: 10 Document Type: Term Paper

Computer IT Security Implementation Provide a summary of the actual development of your project. Because small corporations have to work under conditions of conflicting information technology in many instances, the requirement of maintaining these systems details entails far too many time-consuming processes that have to be carried out. This allows for the business to work in a logical order and promotes a more logical approach to the making of business decisions. The end

Security Information Is the Power. The Importance
Words: 5012 Length: 15 Document Type: Term Paper

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields

Security Issues and Features of
Words: 975 Length: 4 Document Type: Annotated Bibliography

The authors have expertise with Oracle databases and use examples from the enterprise products this software vendor provides to make their point regarding security of highly distributed networks. One of the more valuable aspects of this specific paper is the focus on how to create a multilevel secure environment in an enterprise. The authors have done enterprise-level database security work in their careers and this article and research communicate

Implementing Security
Words: 433 Length: 2 Document Type: Research Paper

Security Implementation Identity Management and Security Awareness Training Plan Strategy all departments. Duration and frequency: three sessions of one hour each. Technology developments that are used in permanently updating the company's security features must be communicated to employees. Update training sessions of two hours must be performed every three months in order to keep up with technology improvements. The training program must inform employees on the company's security guidelines. The administrative, technical, or physical

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now