BIS 320 WEEK 4 ASSIGNMENT, PROJECT DATA SECURITY PLAN Project Data Security Plan D's Devices thru WIX Stores employs multiple business information systems to secure corporate data and customer infor... mation. Although its systems are safe and in compliance with federal regulations, WIX Stores faces numerous vulnerabilities which could, in turn, affect D's Devices local systems. Additionally, D's Devices must focus on controlling and deterring threats separate from those of WIX Stores. Vulnerability as a concept and as a process can be defined as an exploited weakness to gain access to data (Liu & Cheng, 2009, p. 15). While there is no single perfect system to protect all the information an organization needs to function, the data security plan will help establish norms for accessing and using information system resources. Threats to security can occur either as internal, external or a combination of the two. It is widely known that internal staff is the biggest threat to IT security. Additionally, malicious cyber-attacks, social engineering, purposely downloaded malicious internet content, and information leakage can tear down a network from the inside. External threats include "eavesdropping, routing table overflow, routing cache poisoning, routing maintenance, data forwarding, wormhole, sinkhole, selfish nodes, external denial of service, spoofing, badmouthing, and flattering" (Ngoma, 2012). Small businesses, like D's Devices, are uniquely vulnerable to IT security breaches due to its less sophisticated intrusion detection and monitoring systems than those used by large enterprises. However, collaborating with WIX Stores advanced IT security, which provides a necessary external barrier and D's Devices own internal protection, will significantly reduce and limit threat potential to privacy and financial information of the company and its potential customers. D's Devices will implement its internal security plan through the use Symantec Antivirus and Firewall software installed on the server and all individual seats. Additionally, we will implement hardware controls such to "ensure that hardware is physically secured and [checked] for equipment malfunction" (Laudon & Laudon, 2015, p. 276, Table 8.4 General Controls). Once these controls are in place, it is up to sound judgment and awareness to help maintain our systems in good working order. .......continued..... [Show More]
Last updated: 2 years ago
Preview 1 out of 6 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Feb 18, 2021
Number of pages
6
Written in
This document has been written for:
Uploaded
Feb 18, 2021
Downloads
0
Views
89
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·