Response to the tipoc security for an it system

Assignment Help Computer Engineering
Reference no: EM133703009

Compose a thoughtful response to the tipoc, "Security For an IT system, security requirements are those which protect data from falling into the wrong hands and prevent unauthorized users from accessing or modifying that data. (University of Maryland Global Campus, n.d.) This involves technical requirements like user authentication and data backups. Cyber threats are an important consideration for all organizations because of the financial and legal ramifications of confidential data falling into the wrong hands. Some requirements for the security aspect of an IT system may be: 1. The system must require users to login with two factor authentication at every sign in. 2. The system must backup data to a secure cloud-based backup platform on a daily basis. 3. The system must allow users to be assigned specific roles which dictate their read and write permissions. 4. The system must report potentially malicious activity to the database administrator immediately upon detection. Security requirements for an IT system being used for recruiting are critical because of the large amount of personal and confidential information that is stored for each candidate. For companies like Maryland Technology Solutions, the recruiting team will be handling hundreds of applicant resumes and personal information forms on a monthly basis. All of that information must be securely stored within the company's IT system to prevent it from being stolen and exploited by bad actors. If for some reason applicant's personal information was breached, the company could be vulnerable to lawsuits and take a significant hit to their reputation. (Roy, 2015)

Reference no: EM133703009

Questions Cloud

Manage order information : Include attributes like orderID, customer, products, and the order total. Implement methods to generate order summaries, update order status, and manage order
Why is it important for a grammar to be unambiguous : What is the difference between syntax and semantics and Why is it important for a grammar to be unambiguous?
Shows difference between abstract idea and practical reality : Social theory is an important analytical tool because it: shows the differences between abstract ideas and practical reality. Leads to the discovery of the trut
What is the influenza incidence rate : the nursing home reported 14 new cases of influenza and 4 new cases of pneumonia during the second week of January. What is the influenza incidence rate?
Response to the tipoc security for an it system : Compose a thoughtful response to the tipoc, Security For an IT system, security requirements are those which protect data from falling into the wrong hands
How can software developers improve software quality : Develop a narrated presentation proposal that covers these points: What is software quality? Types of software testing
How do perceptions of self and others influence the way : How do perceptions of self and others influence the way people form personal relationships, maintain personal relationships, or end personal relationships?
Different insurance plans and handling claim denials : What strategies or key points do you hope to learn for effectively navigating through different insurance plans and handling claim denials
List the top three you believe are most important and why : Using these as a guide or other resources online, list the top three you believe are most important and why.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd