Wednesday, April 10, 2019

Security Requirements & Possible Risks Essay Example for Free

Security Requirements thinkable Risks EssayHuffman trucking, an established trucking community since 1936, has recently requested the implementation of a new Benefits Elections dust to assist management in tracking and reporting the benefits of both union and non-union employees. A database system give be utilized to store critical data such as employee reading, along with the benefit pile of their choosing. Storing such teaching requires necessary surety system measures to be in place to fix the total shelter of the data within. The risks associated with storing critical information must(prenominal) overly be thoroughly addressed so Huffman Trucking female genital organ come apart effective action plans to prevent potential threats from hurting the organization. Regardless of the storage method when discourse critical information, security measures must be implemented to effectively protect the data, as well as the company assets from potential threats such a s theft or litigation.Security RequirementsWhen it comes to effectively protecting company data, any organization has the great responsibility to identify as well as implement security policies, values, strategies, processes, procedures, and best practices to fully ensure data safeguard, as well as ensure that organizational goals and objectives be continu whollyy being met (Reiner, 2008). The information that allow for be stored within the Huffman Trucking database allow include employee names, neighborly security turns, birthdates, etc. The loss of such data can ultimately not just harm the employee, but the organization as a whole. In an effort to fall and/or eliminate such risks, security requisites for the Benefits Elections System should include firewall security, encryption, and word protection and renewal.Firewall security is an absolute necessary security requirement to effectively protect the database from malicious attacks such as hackers. Firewall security refer s to a communicate device that will block certain types of network traffic, forming a barricade between a trusted and an untrusted network ( dingle, 2013). The purpose of this security measure is to prevent the spread of computer attacks by blocking entranceway to information from unauthorized sources. Due to the amount of sensitive data that will be stored within the system, it is recommended that the firewalls should be configure to support the default-deny policy, in which the allowed network services are listed, and everything else is denied (Dell, 2013).The use of encryption will also enhance the security of the information that will be stored within the Benefits Elections System. Encryption is a simple security measure that will distort the information contained within an employee file so that it can be viewed only by the authorized users who give the good encryption key to decipher it. Much like firewall security, it will block unauthorized users from accessing confidenti al information by making the data im viable to view.Password protection and renewal are crucial security measures that must be enforced by Huffman Trucking to ensure the protection of data stored within the Benefits Elections System. Authorized users should protect their passwords at all costs un defend passwords trust critical data defenseless to access by unauthorized users. Recommendations to ensure a password is protected include * Password length A password should alship canal be at least eight characters long.* Complexity Make a password as complex as possible by use a variety of letters, numbers, symbols and punctuations. The more complex the password, the better protected it is. * Variation Change a password at least every three months, if not more. * Variety Use different passwords for different accounts. never use the same password for everything. * Confidentiality Never share or write down a password. penning down or sharing a password leaves critical data vulnerable in ways that most people can never imagine.The ability of an organization to renew passwords frequently is a probative step towards enhanced data protection (Brown, 2010). To enhance the effectiveness of password renewal, system users should not confuse the ability to use previous passwords when renewing the current ones. Implementing password renewal on the Benefits Elections System will ensure security measures are continually enforced, especially in the event that if an unauthorized user were to draw access to the system, the password would only be good for a specific length of time earlier it will be changed. Possible RisksRisk is a term that most people, as well as organizations, are familiar with. Risk can be defined as the probability of any possible threat turning into a disaster, which is why significant measures are often taken to reduce and/or eliminate such possibilities. By utilizing a SWOT analysis (Strengths, Weaknesses, Opportunities, and Threats), Huffman Truck ing can effectively restrict the vulnerabilities associated with implementing a Benefits Elections System, and develop action plans to correct the vulnerabilities to prevent the risks from becoming reality. Several risks are often associated with the implementation of a new system, however, the main risks that must be considered by Huffman Trucking include database corruption, human error, and hacking and former(a) malicious attacks.Database corruption is likely the most common cause of data loss within an information system (Mulvey, 2006). Database corruption damages the database and impairs functionality. Memory errors, network errors, office glitches, PC crashing when the database is open are all examples of incidences that can lead to database corruption. Data corruption is unfortunately inevitable however, there are several practices that can be done to avoid such a threat. These practices include, but are not limited to * Ensuring the network is set up comelyly.* Running Sc andisk and Defrag often to ensure hard disk functionality. * Refraining from using databases during thunderstorms to avoid power glitches. * Ensuring the database is implemented correctly, and is ready to be utilized by all system users.Human error is by chance one of the biggest threats that can lead to data corruption. It is important to keep in mind that the greater the number of system users of the Benefits Elections System, the more chances there are for crucial information to be leaked or mishandled. Taking the proper precautions to safeguard the data (this should include a thorough training after system implementation) to ensure the information is appropriately handled at all times is vital to the well-being of both the employees, as well as the organization.Given the amount of sensitive information that will be stored within the Benefits Elections System, it is obvious that Huffman Trucking must be aware that cyber-criminals will try to gain access to such data should it be left unprotected. Breaking into information systems for malicious intent is something that has made security what it is today thorough and inflexible.Hackers are quick-witted nowadays they can make use of a number of tools and techniques to grant them access to information, which can have damaging effects on the victim(s). The possibilities of what a cyber-criminal will do once he or she has access to sensitive information are endless however, one thing is for sure the victim(s) could virtually lose everything. Without the proper security measures that were previously mentioned in place, the Benefits Elections System will be vulnerable to hackers and other malicious attacks.good examining the potential risks with the implementation of any information system will allow an organization to effectively develop action plans and enforce the necessary security measures required to reduce and/or eliminate such risks. A thorough and effective risk analysis will demonstrate how firewall se curity, encryption, and password protection can reduce the risks of database corruption and malicious attacks. Like any information system, the Benefits Elections System will prove to be vulnerable to potential threats if not protected at all costs.ReferencesBrown, T. (2010). Protecting Organizations Most Critical Data with let Password Management. New York, NY Auerbach Publications . Dell. (2013). Retrieved from http// Mulvey, A. (2006). QA Database Corruption. Retrieved from

No comments:

Post a Comment