Finds would cause damage to national security

Assignment Help Computer Engineering
Reference no: EM131557326

Write review on this. Today in order to make face the increasing rate of data breaches in the companies, there is widespread agreement about the interests of participants in protection of privacy, and the corresponding duties of CTO to treat personal information in a confidential manner.

A strong security posture and implementation of a comprehensive privacy and data security plan is the single most effective measure that companies can employ to mitigate the significant costs of remediating a data breach.

Companies would be wise to consider the following suggestions to create an effective privacy, compliance and data protection plan or to revise an existing plan to account for changing laws, regulatory requirements and technological developments.

An important first step is to understand what type of information is being collected and what requirements applicable laws, regulations and other internal compliance policies impose.

In fact we have to identify the types of information collected and the tenet of data processing.

According to David Kim and Salomon, in Fundamental of Information and Security System about data classification standards, P. 43 "The following points define the U.S. federal government data classification standards.

Top secret- Apply to information that the classifying authority finds would cause grave damage to national security if it were disclosed.

Secret- Applies to information that the classifying authority finds would cause serious damage to national security if it were disclosed.

Confidential- Apply to information that the classifying authority finds would cause damage to national security".

It's important to distinguish between information that should be made public and that which should be kept private.

Few people would want to go to a counselor or pastor who supposed to maintain confidentiality. And yet, those advisors have to gauge when information needs to be shared, even if the other person doesn't want it to be.

The book of Proverbs, which extolls the virtues of wisdom, also encourages discretion more than two times in the first five chapters, In Proverbs 2:1 and 5:2 (EVS) it states that "My son, do not lose sight of these keep sound wisdom and discretion ", "You may keep discretion and your lips may guard your knowledge."

These information try depict how important are users awareness. As we can notice that in Networks and Security -John Vacca, P.19 according to the European network and Information Security Agency, "Awareness of the risk and available safeguards is the first line of defense for security of information systems and network".

Networks and Security System Second Edition - John Vacca

Fundamentals of information System Security Third Edition

Verified Expert

So, in order to handle data breach of the in the network, a deep thinking is required before the design of the network, is implemented and also, every personal information can be secured based on the level of access

Reference no: EM131557326

Questions Cloud

Calculate the variances for each line item : Using the provided Excel spreadsheet, calculate the expense proportion of each line item under the tab labeled "Proportional Allocations."
Unions use to manage workplace grievances : What mechanisms do unions use to manage workplace grievances? How do union workplace and nonunion workplace grievance procedures differ?
Provide evidence from the textbook that supports your view : Agree or disagree with Kissinger's statement and provide evidence from the textbook that supports your view. Justify your response.
What are dr yeungs ethical alternative for resolving dilemma : How might the fact that Dr. Yeung is a research psychologist without training or licensure in clinical practice influence the ethical decision?
Finds would cause damage to national security : Write review on this. Today in order to make face the increasing rate of data breaches in the companies, there is widespread agreement about the interests of participants
Corporate social responsibility research report : Review the video Corporate Social Responsibility Research Report - IBM Study, then choose one of the two IBM Study reports to read (2008 or 2009).
How do most individuals monitor and control their cash flow : How does the monitoring of cash flow of a health organization compare to the monitoring the cash flow for individuals handling their personal finances
Conscious or socially responsible capitalism : Compare & contrast multiple stakeholder capitalism (also called conscious or socially responsible capitalism) with investor primacy capitalism
What is the solution set of a system of linear inequalities : How do you find the solution of a system of linear inequalities graphically?

Reviews

inf1557326

8/4/2017 6:03:40 AM

It is awesome paper. I even don't care if my private coach is going to like it. I wish I would have the right stuff to compose as you did - straightforward and intriguing. I'm exceptionally happy that I can utilize your written work and investigating services when I require it. It is a tremendous help for me. Much thanks and best respects.

Write a Review

Computer Engineering Questions & Answers

  Developing a database of measured meteorological data

You are developing a database of measured meteorological data for usage in weather and climate research.

  Develop a set of six powerpoint

Develop a set of six PowerPoint or MS Word slides or six paragraphs to present the history, current level of usage, typical applications, future prospects and usability for the selected application.

  Using social networking website to get applicant information

Some companies are starting to utilize the social networking websites like MySpace and Facebook, to get the information about the job applicants.

  Prompts the user to guess the number

Develop an app that generates a random number and prompts the user to guess the number. When the user clicks the New Game Button, the app chooses a number in the range 1 to 100 at random.

  Introductionbluesky systems is a software development

introductionbluesky systems is a software development company that builds software components for a variety of private

  Write the pseudocode that defines the class

Create the class diagram and write the pseudocode that defines the class - create the class diagram and write the pseudocode that defines the dass.

  Find the nonzero portion of the output

A linear time-invariant system has impulse response: h(t) = e(t - 2) u(t - 2).

  Verify the floppy image with md-5

Using the image in Course Content called Assignment2.001, and using any of the methods that you have seen for doing an MD-5 hash (FTK, PRODISCOVER - THEY CAN BE DOWNLOADED ONLINE), verify the floppy image with MD-5.

  Write least-squares regression equation for airports costs

Write the least-squares regression equation for the airport's costs. Predict the airport's costs during a month when 1,500 flights originate at the airport.

  Write a program to read the scores recieved

A programmming contest was organised between two universities, Elm and Oak. There were n participants from Elma and m participants from Oak.

  Explain the process of evaluating and selecting dbms product

Describe the process of evaluating and selecting the best DBMS product. List examples of the requirements and features you used and justify any assumptions you make.

  Create program that will read a list of student last names

create program that will read a list of student last names

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd