P1 Unit 6 Business

Improved Essays
Data Confidentiality: When you keep important data it is important that the data doesn’t go out to the wrong hands. So if a business data is suddenly leaked online or maybe stolen, then this can result in a huge loss for the business and this can potentially put the business out of business. To overcome this problem, then you would need a good security program which can safeguard against any breach in confidentiality.
Data Integrity: This is used to ensure that the most important data is secure and also makes sure that the data isn’t messed around with. If any of the data has been messed around with then this can result in major problems. The information security program can use tools to track any changes to any important data, also it can show when the file was last
…show more content…
For instance loss of time in a business can cause major issues like money loss and also the frustration for customers and staff. The problems that can cause the loss of time can be like power cuts, floods, fires or a user infecting the network by putting in a USB which can be potentially infected from their home computers. To stop this happening in a short time you should have some emergency generators, data backups this is a good plan when the system is offline.
Business information loss: If a business has an unsecured network, other big companies can use that time to see any of the records for that business. There are some programs online which allow you to access any important information such as account names, usernames, password and many more on an unsecured wireless network. This could be bad for smaller business as they can resort to closing down the business.
Data Loss Issues: Any important data can be targeted though the use of emails over an unsecured network. Like the wireless nodes can be hidden as a part of the network and this can be used to see if anyone is trying to connect to the

Related Documents

  • Decent Essays

    Sole Proprietorship A sole proprietor is a business owned by a person. This person will file his or her business taxes using Schedule C while filing form 1040. For a charitable contribution, it will not be filed on the person’s Schedule C it will be taken as a deduction on his or her personal taxes.…

    • 575 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    • Personnel Expenses were less than budgeted and we saved $5,457. This was due to the staffing changes made in FY17; hire more federal work study employees and cut back on the employees for the evenings and Saturdays. Last year, personnel expense exceeded budget by $9,580. • General expenses are over. I am currently working to reconcile the deficit since part of the expenses are due to the University Mail being misallocated to Student Mail Services.…

    • 92 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Assignment 2: This errand gives proof to criteria M1 BS8888 guidelines, among others are an arrangement of "standards" identifying with the format of specialized drawings. BS8888 specifically portrays the way resistances and surface completions are distinguished, the framework for including explanations, images and shortened forms. BS3939 is the graphical images for electrical power, broadcast communications and hardware charts. These state what the image for a specific segment. BS2917 is the guidelines for liquid power frameworks.…

    • 1213 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    At no time should the workstation be used for personal email use, (i.e. sending or receiving), or social networking sites. The company has a secondary Internet Service Provider (ISP), and that should be used for personal email and social networking via your personal devices, such as cell phones and tablets. Again, you are not permitted to send company information using personal devices or email/social media. Key Control Maintaining constant watch over who has access to what electronic and physical key access is imperative.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    For many jobs you would be expected to have at least a 2:1. If you want to work in the NHS then you will have to enrol onto the NHS Scientist Training Scheme (STP) after completing your degree. You will study for a Masters Degree in the area you have chosen to specialise in. This will give you the extra training you need. It is a paid 3 year program where during that time you are employed by the NHS.…

    • 80 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    1.02.01 Warning Banner

    • 567 Words
    • 3 Pages

    Sub section 9.1.02.01 – Warning Banners Current Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers,desktops, VPN connections, network devices). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government regulations and UnitedHealth Group directives. Modify Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers, desktops, VPN connections, network devices, application elevations). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    The decision to implement a converged technology within an organisation should be a conscious decision, however, with wireless there exists a very real threat of unauthorised implementations. This ultimately creates a risk to the information assets within an organisation, even when there is no perceived threat. So in the security policy the organisation can state its stance upon the installation of wireless access points, in that at the very least they must have prior authorisation and adhere to specific configurations. This policy is mandated as part of the PCI Standard Of course, one of the biggest challenges in protecting an organisation is that malicious outsiders (and possibly insiders) may disregard the policy. Therefore in addition to…

    • 278 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    In general, intellectual property ethics involves fair treatment, moral obligation to reveal the originator, and the compensation of the work. Company employee’s intellectual property ethics includes the following (Global Ethics Solution): • Protecting the company’s intellectual property and act responsibly with the sensitive information of vendors, customers, contractors, and other business partners. • Using confidential information only for the purpose for which it was intended. • Sharing confidential information only with employees who need it to do their job. • Clearly identifying all email communications with confidential markings.…

    • 818 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Wolftech Case Study

    • 1164 Words
    • 5 Pages

    Wolftech need to protect the information system from any type of unauthorized access, disruption, destruction, recording, inspection, disclosure, use and modification. If the confidential information of the organization is exposed to potential risks,…

    • 1164 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Vulnerability Assessments

    • 1747 Words
    • 7 Pages

    Introduction I. Vulnerability Assessments (Or “What do we have of value that must be protected?”) A. The Company Network Figure 1: Existing Company Network 1. Physical Devices a) The NETGEAR MR814 Wireless Router (all versions) has two key vulnerabilities. First, the MR814 only supports Wired Equivalent Privacy (WEP) encryption to secure traffic sent over the wireless network [1]. WEP has numerous, well documented vulnerabilities and exploits.…

    • 1747 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Common Vulnerabilities

    • 164 Words
    • 1 Pages

    Common vulnerabilities include weak default installation settings, wide open access controls, and devices lacking the latest security patches. Top network level threats include need to make sure that there one entry to the server room. The entrance of the access door should not be directly visible to the location of the office where the majority of the officials work. Before the main access door there should be another small door or space to reduce the risk of piggy backing. The electrical wiring should be placed inside fire-resistance panels and if there are any office desk or cabinets, then use only those equipment’s made of fire-resistance materials.…

    • 164 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Computer Forensic Analysis

    • 1326 Words
    • 6 Pages

    Every company today has security vulnerabilities and threats from many angles. Individuals will attempt to take advantage of these vulnerabilities to reach their goal. Others will think what they are doing is a joke or legal or worse yet believe they will not get caught. Some are easy to detect, others are not and require prioritization to handle the data from its original location, create an analysis plan, gather the evidence, and create the evidence reports which must comply with all the laws that affect digital forensics. The increase in connectivity means an increase in the difficulty to gather and secure information to maintain threats to a minimum due to the amount of knowledge that those breaking the law can acquire to attempt to deter the efforts of those trying to piece together the puzzle the wrong doers left behind.…

    • 1326 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Relational Database

    • 984 Words
    • 4 Pages

    Discuss the advantages of a database management approach to the file processing approach? Give examples to illustrate your answer. According to our text, database management is the process of storing data. In the early days of computers, they would use data resource management to store information in a specific location.…

    • 984 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    BEST PRACTICES WHEN BREACHES OCCUR Security includes the “CIA triagle” of confidentiality, integrity, and availability. So, anyone making an effort to protect the security of data, and subsequently databases, should have a goal of protecting all three facets.…

    • 1448 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    She was a woman who was considered to be "The Most Beautiful Woman in the World." Hedy Lamar was born on November 9, 1914, in Austria and raised by Jewish parents. She's the inventor of frequently hopping, but was never given a single dime for her invention. Everyone viewed Hedy as an actress and model because she was so beautiful, but no one ever saw her for her ideas. Wifi has changed my life and the lives of others in the most unpredictable ways, plus our generation today too.…

    • 626 Words
    • 3 Pages
    Decent Essays