University of the Cumberlands Business Impact Analysis Paper

User Generated

erqql7766

Writing

University of the Cumberlands

Description

An organization just completed its BIA (business impact analysis) and was able to use the information from the BIA to assign metrics to it mission critical operations. However, what is missing is data classification. Explain how to go about classifying data and ensuring your classification categories align with establish policy. Moreover, establish a data classification policy for this organization.

This should be a 3 to 4-page paper with proper APA formatting.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: DATA CLASSIFICATION AND POLICY
1

Data Classification and Policy
Student’s Name
Professor’s Name
Course Title
Date

DATA CLASSIFICATION AND POLICY

2

Data Classification and Policy
Data classification is a critical component of information security. It involves
categorizing data based on how sensitive it is into various groups, for example, data ought to be
safeguarded for integrity, availability, and confidentiality (Jain, Gyanchanda & Khare, 2016).
This is helpful for organizations, for example, universities, as they can have an upper hand with
their information which then reduces the potential for data breach by significant levels.
Therefore, data classification should be aligned with the University’s policy of security
information. Notably, policy for data classification is concerned primarily with information
management ensuring that oversensitive information is well handled with regards to the threat it
presents to an organization (Shaikh, Adi & Logrippo, 2017). Further, it considers how the data is
collected, used and structured in an organization allowing the right information is accessed and
viewed only by authorized personnel. Security policy, risk analyses and data classification are all
linked relations used by organizations in combination for the enhancement of security.
The information security applies to all individuals including third parties, the staff and the
faculty of the university including...


Anonymous
I use Studypool every time I need help studying, and it never disappoints.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Content

Related Tags