Business > ESSAY > BIS 320 WEEK 4 ASSIGNMENT, PROJECT DATA SECURITY PLAN (All)

BIS 320 WEEK 4 ASSIGNMENT, PROJECT DATA SECURITY PLAN

Document Content and Description Below

BIS 320 WEEK 4 ASSIGNMENT, PROJECT DATA SECURITY PLAN Project Data Security Plan D's Devices thru WIX Stores employs multiple business information systems to secure corporate data and customer infor... mation. Although its systems are safe and in compliance with federal regulations, WIX Stores faces numerous vulnerabilities which could, in turn, affect D's Devices local systems. Additionally, D's Devices must focus on controlling and deterring threats separate from those of WIX Stores. Vulnerability as a concept and as a process can be defined as an exploited weakness to gain access to data (Liu & Cheng, 2009, p. 15). While there is no single perfect system to protect all the information an organization needs to function, the data security plan will help establish norms for accessing and using information system resources. Threats to security can occur either as internal, external or a combination of the two. It is widely known that internal staff is the biggest threat to IT security. Additionally, malicious cyber-attacks, social engineering, purposely downloaded malicious internet content, and information leakage can tear down a network from the inside. External threats include "eavesdropping, routing table overflow, routing cache poisoning, routing maintenance, data forwarding, wormhole, sinkhole, selfish nodes, external denial of service, spoofing, badmouthing, and flattering" (Ngoma, 2012). Small businesses, like D's Devices, are uniquely vulnerable to IT security breaches due to its less sophisticated intrusion detection and monitoring systems than those used by large enterprises. However, collaborating with WIX Stores advanced IT security, which provides a necessary external barrier and D's Devices own internal protection, will significantly reduce and limit threat potential to privacy and financial information of the company and its potential customers. D's Devices will implement its internal security plan through the use Symantec Antivirus and Firewall software installed on the server and all individual seats. Additionally, we will implement hardware controls such to "ensure that hardware is physically secured and [checked] for equipment malfunction" (Laudon & Laudon, 2015, p. 276, Table 8.4 General Controls). Once these controls are in place, it is up to sound judgment and awareness to help maintain our systems in good working order. .......continued..... [Show More]

Last updated: 2 years ago

Preview 1 out of 6 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$14.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

89
0

Document information


Connected school, study & course


About the document


Uploaded On

Feb 18, 2021

Number of pages

6

Written in

Seller


seller-icon
YourTutor

Member since 5 years

34 Documents Sold

Reviews Received
5
0
3
0
2
Additional information

This document has been written for:

Uploaded

Feb 18, 2021

Downloads

 0

Views

 89

Document Keyword Tags

Recommended For You

Get more on ESSAY »

$14.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·