Question

The main threats that physical security components combat are theft, interruptions to services, physical damage, compromised...

The main threats that physical security components combat are theft, interruptions to services, physical damage, compromised systems and environment integrity, and unauthorized access. However, the information held within the equipment may be much more valuable than the equipment itself.

Which controls we choose to use to mitigate risks to our information depend not only on the value we assign to that information, but also on the dynamic state of that information. Our data exists in one of three states: at rest (like hard disk drives & backup tapes), in motion (like over the internet or network), and in use (like in our RAM).

You work for a large corporation (like Home Depot, Target, Costco, Bank of America, Walmart, etc.) as a security professional. Choose one of these companies and one of these data states (data at rest, in motion or in use). Identify 10 data security controls for that data that you would implement at your company. Always state your references (textbook or internet).

Your initial post should be 100-150 words and reply with a quality question to 2 classmates for full credit.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Hi,

Please find the answer below:

-------------------------------------

Bank Example:

Data security controls to implement in a bank to protect from data threats are:

Password management: Bank organization should implement strong password policy for the bank employees who have access to confidential information.

Data Encryption: Bank data should be encrypted with strong encryption algorithm and keys. All data communication should happen on HTTPS (secure) .

Authentication: Bank organization should implement multi factor authentication for user authentication. For example, one-time password (OTP) for user’s mobile device during the bank portal login.

Authorization: deals with granting data to authenticated users who have access to.

Audit Trails: Application server audit trail records.

Biometrics Access: Biometrics deals with securing bank development centers, office premises with physical characteristics of bank employees, users etc.

Fingerprint access, retina scans etc.

Data Replication in Data Center: Bank data should be replicated on different data centers to avoid accidental data loss.

Digital Signatures/Certificates: Electronic document used for online identity.

Firewall Protection: Bank network ops team should install Firewall to protect the Bank network from intrusion attacks.

Role based access control: Important decisions based on data should be taken as per the roles of the bank organization.

-----------------------------------------

Hope this helps.

Thanks.

Add a comment
Know the answer?
Add Answer to:
The main threats that physical security components combat are theft, interruptions to services, physical damage, compromised...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • The opening case, ‘Hackers Attack the SWIFT Global Banking Network’, discusses breaches in the system of...

    The opening case, ‘Hackers Attack the SWIFT Global Banking Network’, discusses breaches in the system of several banks that are a part of the SWIFT network. The case is an example of the importance of information system controls. Explain some of the security risks associated with information systems as well as some security and control measures that can be implemented to protect against these security risks. Hackers Attack the SWIFT Global Banking Network SWIFT, which stands for Society for Worldwide...

  • The world’s 3 billion-plus smartphones emit the kind of data that health authorities covet during outbreaks....

    The world’s 3 billion-plus smartphones emit the kind of data that health authorities covet during outbreaks. They show where individuals are, where they’ve been and who they might have talked to or even touched — potentially offering maps to find infected people and clues to stopping new ones. But gaining access to this data, even amid a global pandemic, is made complex by the legal and ethical issues surrounding government access to information that can reveal intimate details about citizens’...

  • Hello, Need my paper proof read, I have problems with my paper structure. I need help...

    Hello, Need my paper proof read, I have problems with my paper structure. I need help with my flow as I feel as if my analysis is not iter mixing with the my paper. For example currently I have citation, citation, example, then my analysis. I need help restructure my paper for better flow. I have copied and pasted my paper for review below: Smart home devices have been a growing trend in the Canadian market with approximately 18% of...

  • How do the national income accounts change if social security payments increase? A) Consumption falls. B)...

    How do the national income accounts change if social security payments increase? A) Consumption falls. B) Consumption rises. C) Savings rise. D) This change is not captured in the national income accounts. How do the national income accounts change if unemployment benefits paid to people increase? A) Consumption falls. B) Consumption rises. C) Savings rise. D) This change is not captured in the national income accounts. How do the national income accounts change if national defense spending increases? A) Government...

  • please Identify the key points and main thesis of the article 2. Describe the skills you...

    please Identify the key points and main thesis of the article 2. Describe the skills you will need to develop to manage the hospital of the future. use critical analysis doing these questions Suggestion for writing assignmemnt make believe the reader has never read the article -what are the key points you would want the reader to know in order to understand the hospital of the future. In addition, managers, executives do not have time to read--so again what key...

  • Will facebook be able to have a successful business model without invading privacy? explain your answer?...

    Will facebook be able to have a successful business model without invading privacy? explain your answer? could facebook take any measures to make this possible? BUSINESS PROBLEM-SOLVING CASE Facebook Privacy: Your Life for Sale Facebook has quickly morphed from a small, niche haps most obviously. Facebook allows you to keep in networking site for mostly Ivy League college stu- touch with your friends, relatives, local restaurants, dents into a publicly traded company with a market and, in short, just about...

  • Can Technology Save Sears? Sears, Roebuck used to be the largest retailer in the United States, w...

    Can Technology Save Sears? Sears, Roebuck used to be the largest retailer in the United States, with sales representing 1 to 2 percent of the U.S. gross national product for almost 40 years after World War II. Since then, Sears has steadily lost ground to discounters such as Walmart and Target and to competitively priced specialty retailers such as Home Depot and Lowe’s. Even the merger with Kmart in 2005 to create Sears Holding Company failed to stop the downward...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT