Information security for document management systems

Assignment Help Computer Network Security
Reference no: EM13332529

Information Security for Document Management Systems

According to the Merriam-Webster online dictionary a document is an original or official paper relied on as the basis, proof, or support of something [1]. This was the main definition of a document until approximately eight years ago a need to make documentation readily available and to minimize cost of distribution became an important and costly issue. A paper document is a tangible object that can be signed, copied, stamped, protected in a fire proof vault, and verified. It has a life span of 75 years. The flip side of paper is that it can be costly to store and distribute.

Electronic management is a practice and software systems that are used in order to make documentation easier to distribute and make it readily available for use. Although it is often times less costly to maintain documentation in an electronic format it has its downfalls. I will discuss the pitfalls of an electronic management system as it relates to authentication, availability, confidentiality, and integrity. In the document control world maintaining the integrity of the documentation is the most important role the system should play. For instance what good is it to be able to find a document if it will not be recognized in the court of law. The rapid rate at which technology changes also hinders the document control process. File formats are constantly being changed updated and obsoleted, during conversion information is most times lost and corrupted.

Currently my department is in the middle of transitioning from a completely paper based system to an electronic document management system. According to AIIM, a Document Management System is the use of a computer system and software to store, manage and track electronic documents and electronic images of paper based information captured through the use of a document scanner [2]. Some document management systems offer version control, check in and check out locking, audit trails, stamps, etc. Approximately four years ago my company the Advanced Photon Source of Argonne National Laboratory purchased and Electronic Document Management System made by Stellent Inc. Their system was called "Stellent Content Management System. After Stellent was acquired by Oracle it is now called UCM.

The use of an EDMS system allows a company to make electronic forms of documentation available. In addition to being able to access the information 24/7 it can also track the lifecycle of the documentation. But our current system lacks important security measures that will prevent the information from being altered. This feature is a must have in order for the courts to acknowledge the documentation as valid. Not only can the integrity of the system be challenged but the security measures that are currently in place are not enough to safeguard the information.

For instance, there should be current policies and procedures in place that lay out guidelines on how to deal with backup and recovery of lost information. The backup tapes should be filed in an off-site storage in case of fire and not within the confines of our office where the computer and the backup files can be destroyed simultaneously. I will cite information that has been gathered in papers and case studies concerning the vulnerabilities and threats of the Oracle UCM Security [3].

Moreover the systems lack the proper security measures to safeguard the system from being hacked. Currently the system resides on the intranet behind the firewall. Although this can be viewed as a good security measures employees are allowed access to the system from home via the CISCO VPN program. The Cisco program has built in security and endpoints [4]. This is an added system that could also contribute to vulnerabilities that needs to be addressed. Moreover, I will discuss the use of home computers by employees that have not been properly safeguarded from physical or electronic threats[5].

I will define and assess all vulnerabilities within each component of the document management system and give solid examples and solutions that can be used to better safeguard our information. The system is authenticated by using our LDAP accounts. Each employee is assigned to a security group but the documentation is manually entered into the proper category because we rely on the employee to assign the group we are at risk of confidential information being compromised.

After I have identified and assessed all the vulnerabilities and threats I will analyze the level of risk of the threats. In addition I will then show the financial lost, gain or benefit to correcting the issues. I will also make suggestions of information that should be addressed and included in the policies and procedures as it relates to storage, backup and recovery.

Reference no: EM13332529

Questions Cloud

Explain production of an alkyl bromide as the reaction : A student is asked to react 3-methyl-2-butanol with HBr. predict the products and explain why the experiment will not be as successful for production of an alkyl bromide as the reaction of 1-butanol with HBr
Determine the ratio of the two masses : two blocks of mass m1 and m2 approach each other on a horizontal table with the same constant speed, Vo, as measured by a laboratory observer. Determine the ratio of the two masses m1/m2
Compute the equilibrium constant at 2400 k : When adjusted for any changes in delta H and delta S with temperature, the standard free energy change delta G note at 2400 K is equal to 1.22*10^5 J/mol . Calculate the equilibrium constant at 2400 K
Method of creating the profit-and-loss statement : What is the impact of this method of creating the profit-and-loss statement on management decision making - what is the impact of this method of creating the profit-and-loss statement on business performance
Information security for document management systems : The system is authenticated by using our LDAP accounts. Each employee is assigned to a security group but the documentation is manually entered into the proper category because we rely on the employee to assign the group we are at risk of confide..
Explain what if you did the extraction 3 times : What if you did the extraction 3 times 3. What if you just used 45 mL of ether in one big extraction. Why isn't this better
Determine the work done by friction on the crate : You are pushing a 150-kg wooden crate in a straight line a distance of 4.5 m across a wooden floor at constant speed. What is the work done by friction on the crate
How fast should the weight be thrown downward : A light but rigid stick is attached to a small weight. The other end of the stick is attached to a pivot. The pivot allows the stick and weight to spin in a vertical circle. how fast should the weight be thrown downward
What is the speed of the mass after going around the loop : A bead of mass m slides without friction down a track and around a loop-the-loop of radius R. The initial height of the track is h = 3.5R. What is the speed of the mass after going around the loop

Reviews

Write a Review

Computer Network Security Questions & Answers

  How many other messages expected to generate same hash value

A 1,048,576-bit message is used to generate 10-bit hash. One average, how many other messages could be expected to generate same hash value?

  Problem on network security planning

Securing a large internetwork remains a daunting challenge. Cloud computing and social networks add to this complexity. In two to three (2-3) pages, and using the CISCO SAFE reference architecture.

  Explain simple issue specific security policy in school

Rrules and regulations you have been provided with in your institution.does your school have a similar policy?does it contain all the elements listed in the text?

  What encryption mechanism is used in the cquroam

What wireless security type does CQUniversity implement to enable roaming? Explain how this wireless security type work and what encryption mechanism is used in the CQURoam?  Explain  how this mechanism works

  Email viruses are typically launched by people

Email viruses are typically launched by people who modify header information to hide their identity. Brightmail's Enrique Salem says that in the future

  Give the security levels top secret-secret and confidential

Give the security levels Top SECRET,SECRET,CONFIDENTIAL, and UNCLASSIFIED (order from highest to lowest), and catergories A, B,C, specify what type of access (read,write, both or neither) is allowed in each of the following situations .

  Create an overloaded constructor

Create the statements to make an overloaded constructor for the class named Car. The constructors should support 0, 1, or 2 arguments. The 1st argument will denote engine size and contain an Integer.

  Securing several desktop computers connected to network

Securing numerous desktop computers connected to the network. Explain the access control that you would put in place for each and explain why.

  How much information is available to potential hackers

Maintaining a proactive approach on security requires that an organization perform its own hacking footprinting to see how much information is available to potential hackers

  Access control list

DNS Cache Poisoning attack, Turtle Shell Architecture,

  Determine largest allowable sender window

Assume the sqquence number space is of size k. Determine the largest allowable sender window which will avoid the happening of problems of these protocols?

  Data security or computer-network security

The second research report should include applications of the security theories, principles, and techniques of the subject.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd