Finds would cause damage to national security

Assignment Help Computer Engineering
Reference no: EM131557326

Write review on this. Today in order to make face the increasing rate of data breaches in the companies, there is widespread agreement about the interests of participants in protection of privacy, and the corresponding duties of CTO to treat personal information in a confidential manner.

A strong security posture and implementation of a comprehensive privacy and data security plan is the single most effective measure that companies can employ to mitigate the significant costs of remediating a data breach.

Companies would be wise to consider the following suggestions to create an effective privacy, compliance and data protection plan or to revise an existing plan to account for changing laws, regulatory requirements and technological developments.

An important first step is to understand what type of information is being collected and what requirements applicable laws, regulations and other internal compliance policies impose.

In fact we have to identify the types of information collected and the tenet of data processing.

According to David Kim and Salomon, in Fundamental of Information and Security System about data classification standards, P. 43 "The following points define the U.S. federal government data classification standards.

Top secret- Apply to information that the classifying authority finds would cause grave damage to national security if it were disclosed.

Secret- Applies to information that the classifying authority finds would cause serious damage to national security if it were disclosed.

Confidential- Apply to information that the classifying authority finds would cause damage to national security".

It's important to distinguish between information that should be made public and that which should be kept private.

Few people would want to go to a counselor or pastor who supposed to maintain confidentiality. And yet, those advisors have to gauge when information needs to be shared, even if the other person doesn't want it to be.

The book of Proverbs, which extolls the virtues of wisdom, also encourages discretion more than two times in the first five chapters, In Proverbs 2:1 and 5:2 (EVS) it states that "My son, do not lose sight of these keep sound wisdom and discretion ", "You may keep discretion and your lips may guard your knowledge."

These information try depict how important are users awareness. As we can notice that in Networks and Security -John Vacca, P.19 according to the European network and Information Security Agency, "Awareness of the risk and available safeguards is the first line of defense for security of information systems and network".

Networks and Security System Second Edition - John Vacca

Fundamentals of information System Security Third Edition

Verified Expert

So, in order to handle data breach of the in the network, a deep thinking is required before the design of the network, is implemented and also, every personal information can be secured based on the level of access

Reference no: EM131557326

Questions Cloud

Calculate the variances for each line item : Using the provided Excel spreadsheet, calculate the expense proportion of each line item under the tab labeled "Proportional Allocations."
Unions use to manage workplace grievances : What mechanisms do unions use to manage workplace grievances? How do union workplace and nonunion workplace grievance procedures differ?
Provide evidence from the textbook that supports your view : Agree or disagree with Kissinger's statement and provide evidence from the textbook that supports your view. Justify your response.
What are dr yeungs ethical alternative for resolving dilemma : How might the fact that Dr. Yeung is a research psychologist without training or licensure in clinical practice influence the ethical decision?
Finds would cause damage to national security : Write review on this. Today in order to make face the increasing rate of data breaches in the companies, there is widespread agreement about the interests of participants
Corporate social responsibility research report : Review the video Corporate Social Responsibility Research Report - IBM Study, then choose one of the two IBM Study reports to read (2008 or 2009).
How do most individuals monitor and control their cash flow : How does the monitoring of cash flow of a health organization compare to the monitoring the cash flow for individuals handling their personal finances
Conscious or socially responsible capitalism : Compare & contrast multiple stakeholder capitalism (also called conscious or socially responsible capitalism) with investor primacy capitalism
What is the solution set of a system of linear inequalities : How do you find the solution of a system of linear inequalities graphically?

Reviews

inf1557326

8/4/2017 6:03:40 AM

It is awesome paper. I even don't care if my private coach is going to like it. I wish I would have the right stuff to compose as you did - straightforward and intriguing. I'm exceptionally happy that I can utilize your written work and investigating services when I require it. It is a tremendous help for me. Much thanks and best respects.

Write a Review

Computer Engineering Questions & Answers

  Produce the context diagram for system

Produce the context diagram for system.

  Questionlets make a discussion prevalence of project

questionlets make a discussion prevalence of project failure. think of or find cases of a project that didnt have the

  Questionthink following relational schema for a

questionthink following relational schema for a

  Identify and research three different commercial it security

Prepare a report providing categorical feature comparison for the three products in the chosen category and make recommendations about the products to assist purchasing decision.

  What coins to give out for any amount of change

Write a program that tells what coins to give out for any amount of change from 1 cent to 99 cents. For example, if the amount is 86 cents, the output would be something like the following.

  Assess the product by using the five-step plan that is

imagining yourself to be the customer construct a house of quality to provide the organization with your perspectives

  Questionsstudy any two multicore processor architecture and

questionsstudy any two multicore processor architecture and discuss the following features briefly.a bus architectureb

  Questionpart iassume you wanted to implement a control unit

questionpart iassume you wanted to implement a control unit for a computer that you are designing.would you use a

  Why canot a binary search be applied on the list below

Why can't a binary search be applied on the list below?

  Image processing and computer vision research project

The Image Processing and Computer Vision Research Project/Paper is designed to be an opportunity for you explore a particular branch of this diverse field in more depth than can be done in the lecture format of the class.

  Code the micro program segments or lda instruction

Code the micro program segments or LDA and TIX instructions in Table in binary and hexadecimal.

  Lottery requires that you select six different numbers

A lottery needs that you select six different numbers from the integers 1 to 49. Write a Java program that will do this for you and generate five sets of six numbers as a result.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd