Preview

Information Security Problems

Powerful Essays
Open Document
Open Document
2943 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security Problems
Problems, challenges at CB Hart that are addressed and which solution is proposed for.

Following the recent data leakage from the Hale firm I suggest that cryptography is used as a prevention measure to avoid similar issues. Business relies to certain extent on mobile technology and portable storage devices to communicate and exchange data faster and easier. Encrypting data is very efficient method to protect sensitive information. In such a merger it is important to keep a safe internal network and synchronised antivirus software on all devices and components. As well as keeping patches of used applications up to date. “Patch or mitigate within two days for high risk vulnerabilities. Use the latest version of applications.” (AUS Government). It is important to minimise the number of users with administrative privileges until an efficient network is driven through all devices. Only people who are in need of information about an ongoing case should be permitted to access any sensitive data and even that must be done under after an administrative permission of a higher executive. Consumerisation of IT must be brought down to a minimum of only in-office desktop devices usage until everyone is generated an appropriate username and password for the company network access. * To prevent the law firm from having any more data leakages proper network activity/security must be carried out and documented. * Patch applications such as PDF readers, Microsoft Office, Java, Flash Player and web browsers. * Patch operating system vulnerabilities. * Minimise the number of users with administrative privileges. Proper Network Access Control must be carried out to set appropriate user privileges * Data encryption must be applied if assessed as a necessary data protection measure

What are the major information security problems that currently challenge organisations? (Background information)

Following another recent accident similar to Hale firm’s data



References: Alan Calder & Steve Watkins, International IT Governance: An Executive Guide to ISO 17799/ ISO 27001, Kogan Page Limited, 2006 Freeform Dynamics Ltd., The Register, The Consumerisation of IT: A question of freedom versus control, October 2011 Andrew Rose, “Information Security in Law Firms”, 2006 Australian Government, Department of Defense, Intelligence and Security, “Top 35 Mitigations”; http://www.dsd.gov.au/infosec/top35mitigationstrategies.htm (accessed 8pm on 22 Nov 2011)

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | * Patch history * VPN * Firewall * Stateful Inspection * Whitelists-Blacklists * Boundary Encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    • Your summary should be written in a concise and clear manner that summarizes your policy for readers.…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue two. Based on the premise that most of the managers have BlackBerry devices for instant communications and all employees are provided cell phones, you must research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity, and non-repudiation, and the recovery of encrypted information in its original form.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Nt2580 Final Project

    • 1848 Words
    • 6 Pages

    Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system.…

    • 1848 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lesson 9

    • 673 Words
    • 3 Pages

    ___i____ 2. Group Policy software installations rely on this file type to create an installation package that can be cleanly Assigned and Published and that has self- healing capabilities.…

    • 673 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    ERR task B

    • 933 Words
    • 3 Pages

    Data protection: never give out personal information about colleagues or service users to unauthorised people or organisations. Never disclose commercial information about company’s activities to unauthorised people or organisations. Keep all data secure and use my own log in and not share passwords. Any papers, CD’s, portable USB devices should be locked away whenever possible, cabinets and draws that contain sensitive…

    • 933 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    Let’s look at confidentiality which is one of the most important measures to maintain safety and security. Not following procedures according to Data Protection Act 1998, which objectives aim at secure data processing and storage, may result in legal action against employers. These procedures may vary depend on the nature of the business. Nowadays vast majority of the business relay on computerised filling system, therefore, employers must take every necessary measure to protect that system from for example, hackers. Employees, on the other hand must follow all procedures to ensure they use system correctly and legally. Consequently, not following health, safety and security procedures may also lead to economic crises of an organisation, for example, court may order to pay very high fine or close down the business and loss of the customers. Moreover, an employer who failed to follow health, safety and security procedures where as a result employees are getting harmed at work is highly likely to be exposed to organisational grievance or disciplinary procedures. For example, in a care home failure to provide moving and handling training to induction staff would have catastrophic consequences such as: spine injuries acquired by using incorrectly equipment or by not using it at all when necessary or even a death of a care taker if handled inappropriately using unsecured hoist. This scenario would not…

    • 335 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It is important to have a secure protected system for all the service users because it is required by law – under the data protection act 1998 states all personal information must be kept private and secured under a lock also to not speak about any individuals outside of the office or in a public area this is done so that all service users details are protected in order to prevent identity theft.…

    • 762 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Security

    • 409 Words
    • 2 Pages

    Michael Nhan SE578-Practices for Administration of Physical & Operations Security Prof: Rodney Smith How do Administrative, Technical, and Physical Controls introduce a false sense of security? According to research and studies, the leading broadband providers have accumulated a total of over 17.4 million high-speed Internet subscribers in the US” This means that in the United States alone there are more than 17 million computers with fast connections most of which are connected to the Internet 24 hours a day, 7 days a week and that number continues to grow. Having a false sense of security is very common among consumers who own and operate a PC within their homes. Nothing is ever secured. I would never say something is secured within the terms of information security. Administrative, Technical, and Physical introduce a false sense of security by the idea of what we use to safeguard sensitive data and protect consumers’ privacy. The idea of purchasing a virus protection identifies that all personal information will be safeguarded and protected, which gives consumers a false sense of security. Having a false sense of security means that I entrust beliefs that I’m guaranteed protection at all times and, that I should not be concerns about my computer being compromised because I took the necessary precautions in purchasing a virus protection. What are the consequences to the strategy if there are no verification practices? disclosure of proprietary corporate information. What can a firm do to bolster confidence in their Defense-in-Depth strategy? How do these activities relate to “Best Practices”? How can these activities be used to demonstrate regulatory compliance? Sarbanes-Oxley_Act. (n.d.). Wikipedia, the free encyclopedia. Retrieved September 21, 2008, from Reference.com website: http://dictionary.reference.com/browse/Sarbanes-Oxley_Act M2PressWIRE; 08/12/2008 Dublin: “Data New Report Details the Data Center Automation Solutions Market for 2007-2010"…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Principles of Information Security, Fourth Edition Michael E. Whitman and Herbert J. Mattord Vice President Editorial, Career Education & Training Solutions: Dave Garza Director of Learning Solutions: Matthew Kane Executive Editor: Steve Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Development Editor: Lynne Raughley Editorial Assistant: Jennifer Wheaton Vice President Marketing, Career Education & Training Solutions: Jennifer Ann Baker Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Associate Marketing Manager: Shanna Gibbs Production Manager: Andrew Crouth Content Project Manager: Brooke Greenhouse Senior Art Director: Jack Pendleton Manufacturing Coordinator: Amy Rogers Technical Edit/Quality Assurance: Green Pen Quality Assurance…

    • 18692 Words
    • 75 Pages
    Powerful Essays
  • Better Essays

    Organizational Issues

    • 831 Words
    • 4 Pages

    Security measures are being implemented to prevent confidential information leaks within the company. Once the security measures have been established it immediately noticed that there was a leak of information, which was not considered confidential. This information had been leaked from an employee of the company. In addition, another member of the company did additional research to find out who exactly was sharing the information with the public. It came from an initially anonymous source who hacked into the personal computer of a fellow employee. A decision has to be made on how to handle the two employees who have violated company policy and prevent further occurrences of the same situations.…

    • 831 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University Outline • Example: iPremier Company (HBR article) – Background about company – Business Implications – Some recommendations for future • Management’s role in information security • Framework for a balanced approach to security Example: DDoS attack on iPremier Company • For a background about the company - refer to MS Word Document distributed in class. • Problems at Colocation facility: •…

    • 1251 Words
    • 10 Pages
    Good Essays
  • Good Essays

    As many businesses try to make their companies thrive by connecting their systems to the internet, some companies may become very skeptical about this. With virtually everyone in the world being connected to some type of network, having all of company data linked together can cause a very serious problem by one user’s mistake or problem. In many instances, the potential for data loss or a small security breach increases when creating a network. This can happen over large or small networks, but when it comes to how important security is, the size is totally insignificant. The sole purpose in network security is to prevent any loss of data by mismanaging it.…

    • 838 Words
    • 4 Pages
    Good Essays