Information security for document management systems

Assignment Help Computer Network Security
Reference no: EM13332529

Information Security for Document Management Systems

According to the Merriam-Webster online dictionary a document is an original or official paper relied on as the basis, proof, or support of something [1]. This was the main definition of a document until approximately eight years ago a need to make documentation readily available and to minimize cost of distribution became an important and costly issue. A paper document is a tangible object that can be signed, copied, stamped, protected in a fire proof vault, and verified. It has a life span of 75 years. The flip side of paper is that it can be costly to store and distribute.

Electronic management is a practice and software systems that are used in order to make documentation easier to distribute and make it readily available for use. Although it is often times less costly to maintain documentation in an electronic format it has its downfalls. I will discuss the pitfalls of an electronic management system as it relates to authentication, availability, confidentiality, and integrity. In the document control world maintaining the integrity of the documentation is the most important role the system should play. For instance what good is it to be able to find a document if it will not be recognized in the court of law. The rapid rate at which technology changes also hinders the document control process. File formats are constantly being changed updated and obsoleted, during conversion information is most times lost and corrupted.

Currently my department is in the middle of transitioning from a completely paper based system to an electronic document management system. According to AIIM, a Document Management System is the use of a computer system and software to store, manage and track electronic documents and electronic images of paper based information captured through the use of a document scanner [2]. Some document management systems offer version control, check in and check out locking, audit trails, stamps, etc. Approximately four years ago my company the Advanced Photon Source of Argonne National Laboratory purchased and Electronic Document Management System made by Stellent Inc. Their system was called "Stellent Content Management System. After Stellent was acquired by Oracle it is now called UCM.

The use of an EDMS system allows a company to make electronic forms of documentation available. In addition to being able to access the information 24/7 it can also track the lifecycle of the documentation. But our current system lacks important security measures that will prevent the information from being altered. This feature is a must have in order for the courts to acknowledge the documentation as valid. Not only can the integrity of the system be challenged but the security measures that are currently in place are not enough to safeguard the information.

For instance, there should be current policies and procedures in place that lay out guidelines on how to deal with backup and recovery of lost information. The backup tapes should be filed in an off-site storage in case of fire and not within the confines of our office where the computer and the backup files can be destroyed simultaneously. I will cite information that has been gathered in papers and case studies concerning the vulnerabilities and threats of the Oracle UCM Security [3].

Moreover the systems lack the proper security measures to safeguard the system from being hacked. Currently the system resides on the intranet behind the firewall. Although this can be viewed as a good security measures employees are allowed access to the system from home via the CISCO VPN program. The Cisco program has built in security and endpoints [4]. This is an added system that could also contribute to vulnerabilities that needs to be addressed. Moreover, I will discuss the use of home computers by employees that have not been properly safeguarded from physical or electronic threats[5].

I will define and assess all vulnerabilities within each component of the document management system and give solid examples and solutions that can be used to better safeguard our information. The system is authenticated by using our LDAP accounts. Each employee is assigned to a security group but the documentation is manually entered into the proper category because we rely on the employee to assign the group we are at risk of confidential information being compromised.

After I have identified and assessed all the vulnerabilities and threats I will analyze the level of risk of the threats. In addition I will then show the financial lost, gain or benefit to correcting the issues. I will also make suggestions of information that should be addressed and included in the policies and procedures as it relates to storage, backup and recovery.

Reference no: EM13332529

Questions Cloud

Explain production of an alkyl bromide as the reaction : A student is asked to react 3-methyl-2-butanol with HBr. predict the products and explain why the experiment will not be as successful for production of an alkyl bromide as the reaction of 1-butanol with HBr
Determine the ratio of the two masses : two blocks of mass m1 and m2 approach each other on a horizontal table with the same constant speed, Vo, as measured by a laboratory observer. Determine the ratio of the two masses m1/m2
Compute the equilibrium constant at 2400 k : When adjusted for any changes in delta H and delta S with temperature, the standard free energy change delta G note at 2400 K is equal to 1.22*10^5 J/mol . Calculate the equilibrium constant at 2400 K
Method of creating the profit-and-loss statement : What is the impact of this method of creating the profit-and-loss statement on management decision making - what is the impact of this method of creating the profit-and-loss statement on business performance
Information security for document management systems : The system is authenticated by using our LDAP accounts. Each employee is assigned to a security group but the documentation is manually entered into the proper category because we rely on the employee to assign the group we are at risk of confide..
Explain what if you did the extraction 3 times : What if you did the extraction 3 times 3. What if you just used 45 mL of ether in one big extraction. Why isn't this better
Determine the work done by friction on the crate : You are pushing a 150-kg wooden crate in a straight line a distance of 4.5 m across a wooden floor at constant speed. What is the work done by friction on the crate
How fast should the weight be thrown downward : A light but rigid stick is attached to a small weight. The other end of the stick is attached to a pivot. The pivot allows the stick and weight to spin in a vertical circle. how fast should the weight be thrown downward
What is the speed of the mass after going around the loop : A bead of mass m slides without friction down a track and around a loop-the-loop of radius R. The initial height of the track is h = 3.5R. What is the speed of the mass after going around the loop

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd