NPU Information Governance and Privacy and Security Functions Paper

User Generated

Gjvaxyr8890

Writing

Northwestern Polytechnic University

Description

Read Chapter 11:  Information Governance and Privacy and Security Functions.

According to the authors, privacy and security go hand in hand; hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but must also go much further as privacy breaches are damaging to its customers, reputation, and could potentially put the company out of business. 

As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.  Taking Cyberattack proliferation of 2011 into context, security experts at Intel/McAfee discovered a huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations.


User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hi, donecheck it

INFORMATION GOVERNANCE AND PRIVACY AND SECURITY FUNCTIONS

Cyberattack is an attempt or an attack by one or a group of hackers, launched from single or
more computers and directed other computers or computer system network with an intent to
damage, destroy, disable or alter the computer system[1]
To prevent cyber attack then the mechanism has to be put in place to combat such a threat.
Cybersecurity is the mechanism established to protect computer systems connected to a network,
this includes protecting both software and data from cyberattacks. The main goal of employing
cybersecurity is to minimize any risk and provide security to sensitive data from hackers with
malicious intent. It is through information security, which is designed to maintain the
confidentiality that the privacy of data is kept intact.
Taking Cyberattack proliferation of 2011 into context shows that cyber-attacks have grown to
become a global threat if it is not controlled at an early stage. According to the information
security company, McAfee, 72 organizations were attacked globally with the united states being
the major victim of the attack. In US 49 out of 72 total ta...


Anonymous
I was stuck on this subject and a friend recommended Studypool. I'm so glad I checked it out!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags