Finds would cause damage to national security

Assignment Help Computer Engineering
Reference no: EM131557326

Write review on this. Today in order to make face the increasing rate of data breaches in the companies, there is widespread agreement about the interests of participants in protection of privacy, and the corresponding duties of CTO to treat personal information in a confidential manner.

A strong security posture and implementation of a comprehensive privacy and data security plan is the single most effective measure that companies can employ to mitigate the significant costs of remediating a data breach.

Companies would be wise to consider the following suggestions to create an effective privacy, compliance and data protection plan or to revise an existing plan to account for changing laws, regulatory requirements and technological developments.

An important first step is to understand what type of information is being collected and what requirements applicable laws, regulations and other internal compliance policies impose.

In fact we have to identify the types of information collected and the tenet of data processing.

According to David Kim and Salomon, in Fundamental of Information and Security System about data classification standards, P. 43 "The following points define the U.S. federal government data classification standards.

Top secret- Apply to information that the classifying authority finds would cause grave damage to national security if it were disclosed.

Secret- Applies to information that the classifying authority finds would cause serious damage to national security if it were disclosed.

Confidential- Apply to information that the classifying authority finds would cause damage to national security".

It's important to distinguish between information that should be made public and that which should be kept private.

Few people would want to go to a counselor or pastor who supposed to maintain confidentiality. And yet, those advisors have to gauge when information needs to be shared, even if the other person doesn't want it to be.

The book of Proverbs, which extolls the virtues of wisdom, also encourages discretion more than two times in the first five chapters, In Proverbs 2:1 and 5:2 (EVS) it states that "My son, do not lose sight of these keep sound wisdom and discretion ", "You may keep discretion and your lips may guard your knowledge."

These information try depict how important are users awareness. As we can notice that in Networks and Security -John Vacca, P.19 according to the European network and Information Security Agency, "Awareness of the risk and available safeguards is the first line of defense for security of information systems and network".

Networks and Security System Second Edition - John Vacca

Fundamentals of information System Security Third Edition

Verified Expert

So, in order to handle data breach of the in the network, a deep thinking is required before the design of the network, is implemented and also, every personal information can be secured based on the level of access

Reference no: EM131557326

Questions Cloud

Calculate the variances for each line item : Using the provided Excel spreadsheet, calculate the expense proportion of each line item under the tab labeled "Proportional Allocations."
Unions use to manage workplace grievances : What mechanisms do unions use to manage workplace grievances? How do union workplace and nonunion workplace grievance procedures differ?
Provide evidence from the textbook that supports your view : Agree or disagree with Kissinger's statement and provide evidence from the textbook that supports your view. Justify your response.
What are dr yeungs ethical alternative for resolving dilemma : How might the fact that Dr. Yeung is a research psychologist without training or licensure in clinical practice influence the ethical decision?
Finds would cause damage to national security : Write review on this. Today in order to make face the increasing rate of data breaches in the companies, there is widespread agreement about the interests of participants
Corporate social responsibility research report : Review the video Corporate Social Responsibility Research Report - IBM Study, then choose one of the two IBM Study reports to read (2008 or 2009).
How do most individuals monitor and control their cash flow : How does the monitoring of cash flow of a health organization compare to the monitoring the cash flow for individuals handling their personal finances
Conscious or socially responsible capitalism : Compare & contrast multiple stakeholder capitalism (also called conscious or socially responsible capitalism) with investor primacy capitalism
What is the solution set of a system of linear inequalities : How do you find the solution of a system of linear inequalities graphically?

Reviews

inf1557326

8/4/2017 6:03:40 AM

It is awesome paper. I even don't care if my private coach is going to like it. I wish I would have the right stuff to compose as you did - straightforward and intriguing. I'm exceptionally happy that I can utilize your written work and investigating services when I require it. It is a tremendous help for me. Much thanks and best respects.

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd