StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Data Security and Responsibility of the User - Essay Example

Cite this document
Summary
The area in my major is related to video game industry which can be categorized as a computer science industry that is immensely dependent upon computer generated intellectual properties and data. In my major, a large number of gaming designers work on sophisticated computer systems having high end design software tools…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Data Security and Responsibility of the User
Read Text Preview

Extract of sample "Data Security and Responsibility of the User"

Download file to see previous pages

Hence, the human resources department are tasked to track all head hunting and social engineering activities to steal the personal information about the game designers and developers by the competition. In this context, the gaming companies implement stringent Information security policies similar to the ones defined for any software engineering company. Dayarathna (2009) presented five types of unauthorized activities that can be carried out in an organization that is immensely dependent upon computer systems and because all their intellectual properties and data resides on computer systems.

These activities are - access, use, destructions, alterations and disclosure. The protection of information against these unauthorized activities are carried out in three attributes requiring different controls - Confidentiality, Integrity and Availability. In my major, all the information assets including personal records are identified and their requirements pertaining to Confidentiality, Integrity and Availability are assessed. Thereafter, the threats from unauthorized activities are assessed and the internal vulnerabilities are detected such that the risk exposures can be determined.

The asset based risk assessment methodology recommended by NIST is one of the most suitable risk analysis methods applicable in computer systems industries like the gaming industry (Stoneburner and Goguen et al. 2002). The controls are applied as an integral part of the risk mitigation strategies once all the threats and corresponding risks to assets are assessed and documented. Identity management controls to protect personal records form an integral part of such controls. The records comprises of personal attributes, academic records and professional records of employees.

Claub and Kohntopp (2001) argued that identity management requires multilaterally secured communication within an organization. Such a system requires that security concerns of all parties in a communication are protected and hence valid pseudonyms related to all parties need to be shared. If one of the parties is not able to share valid pseudonyms then the party is viewed to be an unauthorized participant in the communication channel. The companies having computer generated intellectual properties are very strict about such pseudonyms that are digitally coded in various access tools provided to valid employees.

Moreover, all communication channels are secured using various controls like e-mails & attachment scrutiny (both in inbound as well as outbound), private e-mail sites blocked by a firewall, intrusion prevention systems deployed at the Internet gateways, telephone conversations are routed through trained operators smart enough to detect social engineering/head-hunting attempts, etc (Phua. 2009). Such mechanisms can help in protecting theft of pseudonyms related to all employees such that their identity can be protected.

Companies dependent upon computer generated intellectual property are highly concerned about protection of personnel information that

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Data Security and Responsibility of the User Essay”, n.d.)
Data Security and Responsibility of the User Essay. Retrieved from https://studentshare.org/miscellaneous/1519767-data-security-and-responsibility-of-the-user
(Data Security and Responsibility of the User Essay)
Data Security and Responsibility of the User Essay. https://studentshare.org/miscellaneous/1519767-data-security-and-responsibility-of-the-user.
“Data Security and Responsibility of the User Essay”, n.d. https://studentshare.org/miscellaneous/1519767-data-security-and-responsibility-of-the-user.
  • Cited: 0 times

CHECK THESE SAMPLES OF Data Security and Responsibility of the User

Web Security and Factors Contributing to Web Security

6 INTRODUCTION 6 BACKGROUND 7 OBJECTIVES 8 FACTORS THAT CONTRIBUTE TO WEB SECURITY 8 Human and Technological Factors 9 The knowledge of the user 9 The technology that is in use at that particular time 9 Tools for Security 9 The necessary tools available for security 9 SECURITY CAN BE ACHIEVED BY ADDRESSING 9 User and Technology Factors 10 responsibility of the user 10 Relevance to Security 10 Sweet Development 11 Design 12 Visualization 12 HISTORY OF WEB SECURITY 12 History of Web Tools 13 Preventing SQL injection 13 Creating awareness to web security 14 Tools to detect web attacks 14 Web versus desktop applications 15 Intelligent information systems 16 INTERNET CONTROLS: 16 Intrusion Detection System: 17 Signature-based network intrusion detection system: 18 Analysis-based network intrusion detection system: 18 Firewalls: 19 Encryption program: 19 Honey popts: 19 CONCLUSION 20 REFERENCE 21 3....
14 Pages (3500 words) Essay

Securing and Protecting Information

These include considering what issues the user knows, such as simple usernames and passwords; what the users has, such as smart cards; and the physical characteristics of the user such as finger prints.... These are availability of the data and information on demand, confidentiality, accountability on the part of individuals charged with the responsibility of managing the information, and data integrity (Dhillon, 2007).... security and Protecting Information Instructor Institution Date Securing and protecting information Development of information security strategies protecting complex data and information across a wide network while also improving system performance as well as ensuring easy data retrieval when necessary is one of the most challenging tasks in network design (Dhillon, 2007)....
3 Pages (750 words) Essay

The Desktop Support Technician

In the paper “The Desktop Support Technician” the author discusses the issue that it is the responsibility of the employee to save her work regularly so that if the PC goes down for any reason, her work is saved.... It is simply part of the perceived responsibility of the worker.... That is clearly the responsibility of the employee.... Backing-up data requires software tools, which are clearly the responsibility of the company to make available to the employee....
13 Pages (3250 words) Assignment

Computer Systems Security

A comprehensive data security system encompasses an assessment of the associated risks and threats to data security.... More importantly, data that was… umed to be stored safely in an organization seems to be migrating out of it, raising privacy concerns and questioning the security of digital storage and distant, scattered workforce.... The Chief Information security Officer for eBay Marketplaces, Dave Cullinane, refers to this as the “de-perimeterization of security” where it has become difficult to demarcate the line between a firm and its clients, suppliers and partners (PGP Corporation, 2007)....
10 Pages (2500 words) Essay

Key Features of Cyber Security

The author of this coursework "Key Features of Cyber security" describes significant cybersecurity vulnerability and associated threats in mobile computing.... Mobile computing can be defined as a notion which relates to displaying, collecting along with transferring data from a mobile-based device to any information system by utilizing a particular or a combination of varied data transfer methods.... obile computers such as tablet computers provide better facilities for storing the data in abundance than the desktops along with providing an option of portability....
9 Pages (2250 words) Coursework

Fair and Responsible Use of Data Mart Equipment

After accessing the given IT equipment, it is the responsibility of the involved users must make sure that the user does not go beyond the specifications in Data Mart's Issue Specific Policy.... Every user remains responsible to comprehend then comply with every rule, policy, law, license along with contracts that are relevant to their respective areas of use.... Similarly, every IT equipment users within Data Mart will be rendered responsible for all actions that lead to violation of the conventional security rules at their respective stations of work....
11 Pages (2750 words) Case Study

Developing a Security Plan

… The paper "Developing a security Plan" is a wonderful example of a term paper on information technology.... nbsp;Information security is the safeguarding of information and information systems.... The paper "Developing a security Plan" is a wonderful example of a term paper on information technology.... nbsp;Information security is the safeguarding of information and information systems.... Thus, information security is necessary to prevent all this....
15 Pages (3750 words) Term Paper

Improvement of Data Quality

The author of the paper "Improvement of data Quality" will begin with the statement that missing data mainly occur at the point of data collection.... It can be due to negligence, mistakes, or failure to know what kind of data is required (Kmietowicz, 2004).... hellip; Once the database has been created, it is important to protect that data from unauthorized access.... This is because some people may access that data and make intentional errors on the data and this may create errors in the database....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us