Question

Q1. What methods/facilities are available to secure data in today's systems? Have these methods proved to...

Q1. What methods/facilities are available to secure data in today's systems? Have these methods proved to be adequate? If not, what changes would you recommend to make these methods more secure?

Q 2. You are asked to design a security system for a company to ensure data protection according to the CIA triad. Discuss how you would go about beginning such an assignment and then explain what your final design should accomplish. Keep in mind cost as an issue

0 0
Add a comment Improve this question Transcribed image text
Answer #1

(Q.1)ANS:

Yes this is an interesting question in our current world in the area of security and for the security issues where people or companies face today.by providing security means that it is the way by which preventing the un-authorized access to our confidential datas.

there are many methods are available to secure our important datas.most probably there are huge datas are to be stored in the case of a companies.

for keeping the datas secure for a company we must provide or implement both physical and logical techniques.

by the logical technique involves some kind of encryptions,authentication services etc.

by physical security involves or implementing security alarms,sensors for the rooms that confidential datas stored.

always provide high secured passwords and never shared to the anonymous people around you.

passwords are change periodically and can be sharable to the authorised peoples only.

always provide encryption technology with most trusted connnections.these secured socket layer encrypt the private data and thus prevent stealing data.

always provide data recovery and data backup mechanisms for the protection of data.

always keep a good antivirus protection to your system is very needed and important step for privacy protection and also for the data security and prevent any virus entry to system.

(Q.2)ANS:

for establishing all level security for data,we must have the following

  • confidentiality
  • availability
  • integrity

the above mentioned are needed for designing good platform to prevent stealing data by others or any hackers.

we must have integrity mechanism and this technique is very helpful to check or comparing the data you have.this integrity mechanism is helpful to check our data is changed or not or stolen by someone.

if any hackers take and modify our data,we can determine if the datas are changed or not.

Add a comment
Know the answer?
Add Answer to:
Q1. What methods/facilities are available to secure data in today's systems? Have these methods proved to...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1- It is advisable to have more than of form of defence, justify the advantages and...

    1- It is advisable to have more than of form of defence, justify the advantages and disadvantages of that approach? 2- In what case you would recommend a screening router firewall architecture over screened host architecture? 3- You need to implement defence in depth for your entire organization. Your management is interested in deploying intrusion prevention systems. Your goal is to protect. 1) All the traffic flowing through a network 2) Endpoints from intrusions. Analyse the technologies you will be...

  • Network Security Class Questions Which statement best describe the term “Network Enumeration”? (...

    Network Security Class Questions Which statement best describe the term “Network Enumeration”? (NOT SURE) Network Enumeration means by hackers scout target leverage techniques over the phone to make the target reveal critical information such as SSN, credit information Network Enumeration means “case the joint” this is another form of intelligence gathering Enumeration identifies and poorly protected resource shares are exploited to gain access Network Enumeration describe the motivation of a hacker and the level of ingenuity of the hackers All...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • Holistic Health Systems (HHS) operates 39 hospital facilities and clinics. The executive team has been reviewing...

    Holistic Health Systems (HHS) operates 39 hospital facilities and clinics. The executive team has been reviewing key metrics over the last year and identified a need to improve Point of Service Collections or simply known as POS (pronounced “P-O-S”). POS is a patient payment that is received within 7 days after discharge. Increasing POS is important for HHS because hospitals are 60% less likely to receive payment once the patient leaves the hospital. The cost to collect on the patient’s...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Physical Security we will survey the security issues identified with the offices, that is, the framework...

    Physical Security we will survey the security issues identified with the offices, that is, the framework and utilities we requirement for our business, and how we can continue giving them at the same quality with no interference. It's implied that you ought to begin with an all around outlined occurrence reaction, calamity recuperation, and business congruity arrangement. In the event that you review the discourses from the security arranging module (part 4), excess is the catchphrase in all answers for...

  • Here is the data analysis project, please I need an excellent project, it is due 4 hours! Statist...

    here is the data analysis project, please I need an excellent project, it is due 4 hours! Statistics course. GENERAL DESCRIPTION For the data analysis project, you address some questions that interest you with the statistical methodology we learn in MAT 235.   You choose the question; you decide how to collect data; you do the analyses. The questions can address almost any topic (although I have veto power), including topics in economics, psychology, sociology, natural science, medicine, public policy, sports,...

  • Sunset Health Systems is a national provider of healthcare. They have 62 wholly owned hospitals in...

    Sunset Health Systems is a national provider of healthcare. They have 62 wholly owned hospitals in 39 states. Within each state are ambulatory surgery centers (ASCs) that also support the hospital communities with outpatient surgical services. Finally, Sunset also owns a total of 120 physician clinics that support the patient flow into the Sunset hospitals and ASCs. Sunset revenues for 2017 were $439 million. The CFO, Robert Staley, reported to the CEO, Bill Rush that the organization had spent $225...

  • QUESTION 73 What AwS database service is used for data warehousing of petabytes of data? ORDS...

    QUESTION 73 What AwS database service is used for data warehousing of petabytes of data? ORDS Elasticache O Redshih DynamoDB QUESTION 74 What AWS tool compares the cost of running your application in an on-premises data center to AWS? Total Cost of Application (TCA) calculator Total Cost of Products (TCP) calculator Total Cost of Ownership (TCO) calculator Total Cost of Operation (TCO) calculator QUESTION 75 What SQL database engine options are available in RDS? (Choose 3 correct answers) MySQL MongoDB...

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT