Information security for document management systems

Assignment Help Computer Network Security
Reference no: EM13332529

Information Security for Document Management Systems

According to the Merriam-Webster online dictionary a document is an original or official paper relied on as the basis, proof, or support of something [1]. This was the main definition of a document until approximately eight years ago a need to make documentation readily available and to minimize cost of distribution became an important and costly issue. A paper document is a tangible object that can be signed, copied, stamped, protected in a fire proof vault, and verified. It has a life span of 75 years. The flip side of paper is that it can be costly to store and distribute.

Electronic management is a practice and software systems that are used in order to make documentation easier to distribute and make it readily available for use. Although it is often times less costly to maintain documentation in an electronic format it has its downfalls. I will discuss the pitfalls of an electronic management system as it relates to authentication, availability, confidentiality, and integrity. In the document control world maintaining the integrity of the documentation is the most important role the system should play. For instance what good is it to be able to find a document if it will not be recognized in the court of law. The rapid rate at which technology changes also hinders the document control process. File formats are constantly being changed updated and obsoleted, during conversion information is most times lost and corrupted.

Currently my department is in the middle of transitioning from a completely paper based system to an electronic document management system. According to AIIM, a Document Management System is the use of a computer system and software to store, manage and track electronic documents and electronic images of paper based information captured through the use of a document scanner [2]. Some document management systems offer version control, check in and check out locking, audit trails, stamps, etc. Approximately four years ago my company the Advanced Photon Source of Argonne National Laboratory purchased and Electronic Document Management System made by Stellent Inc. Their system was called "Stellent Content Management System. After Stellent was acquired by Oracle it is now called UCM.

The use of an EDMS system allows a company to make electronic forms of documentation available. In addition to being able to access the information 24/7 it can also track the lifecycle of the documentation. But our current system lacks important security measures that will prevent the information from being altered. This feature is a must have in order for the courts to acknowledge the documentation as valid. Not only can the integrity of the system be challenged but the security measures that are currently in place are not enough to safeguard the information.

For instance, there should be current policies and procedures in place that lay out guidelines on how to deal with backup and recovery of lost information. The backup tapes should be filed in an off-site storage in case of fire and not within the confines of our office where the computer and the backup files can be destroyed simultaneously. I will cite information that has been gathered in papers and case studies concerning the vulnerabilities and threats of the Oracle UCM Security [3].

Moreover the systems lack the proper security measures to safeguard the system from being hacked. Currently the system resides on the intranet behind the firewall. Although this can be viewed as a good security measures employees are allowed access to the system from home via the CISCO VPN program. The Cisco program has built in security and endpoints [4]. This is an added system that could also contribute to vulnerabilities that needs to be addressed. Moreover, I will discuss the use of home computers by employees that have not been properly safeguarded from physical or electronic threats[5].

I will define and assess all vulnerabilities within each component of the document management system and give solid examples and solutions that can be used to better safeguard our information. The system is authenticated by using our LDAP accounts. Each employee is assigned to a security group but the documentation is manually entered into the proper category because we rely on the employee to assign the group we are at risk of confidential information being compromised.

After I have identified and assessed all the vulnerabilities and threats I will analyze the level of risk of the threats. In addition I will then show the financial lost, gain or benefit to correcting the issues. I will also make suggestions of information that should be addressed and included in the policies and procedures as it relates to storage, backup and recovery.

Reference no: EM13332529

Questions Cloud

Explain production of an alkyl bromide as the reaction : A student is asked to react 3-methyl-2-butanol with HBr. predict the products and explain why the experiment will not be as successful for production of an alkyl bromide as the reaction of 1-butanol with HBr
Determine the ratio of the two masses : two blocks of mass m1 and m2 approach each other on a horizontal table with the same constant speed, Vo, as measured by a laboratory observer. Determine the ratio of the two masses m1/m2
Compute the equilibrium constant at 2400 k : When adjusted for any changes in delta H and delta S with temperature, the standard free energy change delta G note at 2400 K is equal to 1.22*10^5 J/mol . Calculate the equilibrium constant at 2400 K
Method of creating the profit-and-loss statement : What is the impact of this method of creating the profit-and-loss statement on management decision making - what is the impact of this method of creating the profit-and-loss statement on business performance
Information security for document management systems : The system is authenticated by using our LDAP accounts. Each employee is assigned to a security group but the documentation is manually entered into the proper category because we rely on the employee to assign the group we are at risk of confide..
Explain what if you did the extraction 3 times : What if you did the extraction 3 times 3. What if you just used 45 mL of ether in one big extraction. Why isn't this better
Determine the work done by friction on the crate : You are pushing a 150-kg wooden crate in a straight line a distance of 4.5 m across a wooden floor at constant speed. What is the work done by friction on the crate
How fast should the weight be thrown downward : A light but rigid stick is attached to a small weight. The other end of the stick is attached to a pivot. The pivot allows the stick and weight to spin in a vertical circle. how fast should the weight be thrown downward
What is the speed of the mass after going around the loop : A bead of mass m slides without friction down a track and around a loop-the-loop of radius R. The initial height of the track is h = 3.5R. What is the speed of the mass after going around the loop

Reviews

Write a Review

Computer Network Security Questions & Answers

  How the database and web services can be protected

Study how the database and web services can be protected against unauthorized use while maintaining access for authorized users by using firewall and VPN techniques

  Show strategies to prevent such cyber warfare attack

Need a 1000 word paper on the various recent/news on the United States (particular the group known as Anonymous and Lulzsec). Also need the various strategies to prevent such cyber warfare attacks and prevention techniques.

  Your company has assigned you the task

Your company has assigned you the task of evaluating its computer networks. You are to write a memo covering 15 points on which you will evaluate the technology, connectivity, and functioning of the company's computer networks

  Discuss some of the problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  Propose plan that focuses on password policies-

Propose a detailed plan that focuses on password policies and authentication methods to protect the project from becoming public during the research and development phase.

  Illustrate three security services-confidentiality-integrity

Illustrate that three security services: Confidentiality, Integrity, and Availability are enough to deal with threats of: (a) Disclosure, (b) Disruption, (c) Deception (deceive = to cause to accept as true.

  Discuss the risks of having a single root user

Originally Linux/UNIX systems had one all-powerful user called root that managed systems. Discuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems.

  Relationship between technical or it staff

Determine what your relationship would be like with the technical or IT staff at your corporation if you were working side by side on a project or training exercise?

  Use prevention-detection and recovery to secure records

Iit is highly desirable that whoever treats you has access to your record. Using your justification how would you use prevention, detection and recovery to secure the records?

  Design the layout of users

The topology diagram for the different servers and locations and trust domains. For example, where is the firewalls, and where are the users located in the topology.

  Using cbc mode of operation what are consequences

Using CBC mode of operation what are the consequences of decrypting the cipher text if it has an error in the first bit of the first block C?

  Ideas for energizing a project team

Assume you are introduced to a assignment manager, who does not have authority to give a pay raise or promote a project team member.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd