Security in the work place , ethics and Security for computer application and systems, computer science homework help

User Generated

RyranE

Computer Science

BIS221

Description

Purpose of Assignment

Security in the work place is a major concern businesses must address to protect company data. In addition, to automated security, it is also the company's responsibility to implement policies and procedures for the handling of data by company personnel. Students will research risks and threats to digital data and develop security policies all company personnel must be trained on and be held accountable to protect company data.

Assignment Steps

Resources:

  • Internet search engine such as Google™, Yahoo!®, or Bing™.
  • Microsoft® Word 2016
    • Click the "File" tab, then "New" to search for Microsoft® Word Memo Templates
  • Microsoft Office 365, Office 2016: Introductory: Module 1: Creating, Formatting, and Editing a Word Document with a Picture

Note: This is a two-part assignment and students will submit two documents.

Part 1

Develop a 1,400-word summary describing the challenges businesses have in securing data in today's technological environment and what businesses should do to mitigate or minimize risks:

  • Include risks and threats of company data.
  • What policies/procedures should be implemented for the handling of data ensure data protection and business continuity?
  • Include in text citations and references.

Format your assignment consistent with APA guidelines.

Unformatted Attachment Preview

Ethics and Security Paper Grading Guide 1 BIS/221 Version 4 Grading Guide Content 70 Percent Met Partially Met Not Met Total Available Total Earned 70 7 7/7 Met Partially Met Not Met PART 1: Paper describes the challenges businesses have in securing data in today’s technological environment (10%). 10 Paper includes risks and threats of company data (10%). 10 Paper includes policies/procedures that should be implemented for the handling of data to ensure data protection and business continuity (10%). 10 The paper is a minimum of 1,400 words in length and is saved using the following file naming convention (5%): Lastname_Course#_W2.doc (or .docx) 5 PART 2: Memo announces the new security policies to all employees taking effect in one month following mandatory training (10%). 10 Memo is written using a Microsoft® Word memo template (5%). 5 Memo includes a bulleted or numbered list of the new security policies/procedures in bold or changed font color so this list is highly visible (5%). 5 Memo includes an image that is relevant to the memo content (images must also be cited and referenced) (5%). 5 Memo includes an effective date that is highlighted so it stands out (5%). 5 The memo is a minimum of 175 words in length and is saved using the following file naming convention (5%): Lastname_Course#_Memo.doc (or .docx) 5 Writing Guidelines 30 Percent Comments: Paper only is formatted using the APA Guidelines found in the link Writing and Style Guidelines (APA) for 100-299 classes on the lower right side of the Class Home page (5%). 5 Research is properly recognized with both intext citations and a reference page (10%). 10 Copyright © 2016 by University of Phoenix. All rights reserved. Comments: Ethics and Security Paper Grading Guide 2 BIS/221 Version 4 Paragraph and sentence transitions are present, logical, and maintain the flow throughout the paper (5%). 5 Sentences are complete, clear, and concise (5%). 5 Rules of grammar and usage are followed including spelling and punctuation (5%). 5 Assignment Total Total Available Total Earned 30 3 3/3 100 10 10/10 Copyright © 2016 by University of Phoenix. All rights reserved.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Your assignment is ready please feel free to consult where necessary. Thank-You. :-)If you make any inquiry and I don't respond immediately please hold on sometimes responses delay, but I got your back will assist you asap.😀

Running head: COMPANY DATA PROTECTION AND SECURITY

Company Data Protection and Security
Institutional Affiliation
Date

1

COMPANY DATA PROTECTION AND SECURITY

2

Introduction
In the current digital era, cyber security attacks can come from any place either internally
or externally. Advancement in information technology has come at the cost of increased
vulnerability to attack of organizational information and data. Information security has therefore
emerged as a central agenda for companies and institutions, which are worried about the danger
caused by cyber security attacks. Most recently, C-view technologies cooperated with dimension
data to come up with a self-diagnosis tool for cyber security which assists companies to analyze
their current cyber security initiatives/status against industry benchmarks. However, despite the
increased investment by companies on cyber security, there are still some risks and threats which
expose corporate data to attacks. This essay will discuss various risks and threats to company
data and the procedures/policies to be implemented for data handling and protection to enhance
smooth business continuity.
Risks and Threats of Company Data
The first major security risk and a threat to company data are targeted cyber-attacks.
Nowadays, cyber-attacks have ceased to be a mere creation of idle/bored young computer
wizards who are after bragging rights. The nature of attacks network is changing globally, with
attacks being conducted by organized crime syndicates who are everywhere and are globally
connected. The modern-day hacking has advanced whereby hackers do not require the bulk of
information in one go but can now excerpt information over a long-time period (Keller et al.,
2015). This poses a challenge and a difficulty for companies to manage their information
security.

COMPANY DATA PROTECTION AND SECURITY

3

The second threat and risk to company information are data breaches. Many companies'
data is at a risk of being violated, as a consequence of intended leaks by discontented employees,
or other common mistakes such as misplacement of electronic gadgets, which facilitate leakage
or escape of data from companies. A report on by data breach in...


Anonymous
Great content here. Definitely a returning customer.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags