StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Access Security - Assignment Example

Cite this document
Summary
This paper 'Access Security' tells us that access security refers to ensuring the security of data by limiting access to those who only have the permissions to access them. Access security allows people to access data that they need to do their jobs, and nothing more than that. It also includes access to security reporting systems. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
Access Security
Read Text Preview

Extract of sample "Access Security"

An example is an employee who gets access to several reports on salaries and decides to compute the individual salaries of some employees. She is allowed to access each report individually, but she does not have permission to know individual salaries. In other words, not properly understanding the implications of access to several data all at once can lead to semantic security breaches.

  1. Reporting systems increase the risks of semantic security breaches because they give access to several reports simultaneously for reporting needs. Reporting systems do not realize that giving a bulk of information to one employee can result in the latter using them to deduce certain information that they are not allowed to know or access. These systems are important to getting work done, but they can offer access to too much information that can result in semantic security breaches. These systems unintentionally offer information that one person should not have, provided that the person does some deduction that can result in logical assumptions.
  2. An organization can protect itself from accidental losses due to semantic security problems by ensuring that no one person can get access to several data systems or data that can result in semantic security breaches. At the same time, it can hire one person to do one part of the job and not all of the activities of the job, so each person can have limited permissions to access data. Furthermore, it can create clear policies about permissions and data restrictions, and penalties for transgressions. These transgressions can prevent employees from conducting data triangulation. Moreover, it can also ensure that the organization has records of the data access it gives to different employees so that if semantic security breaches happen, they can determine who accessed what. At the same time, the organization can purchase insurance on its semantic security, so that it can have access to financial resources if breaches occur.
  3. An organization has a legal responsibility to protect the company from potential losses due to semantic security problems because the latter can seriously negatively affect shareholders, employees, and consumers. Having access to different kinds of information can pose financial and/or security risks to these stakeholders, such as identity theft and physical theft from knowing how much they are making and where they live. As a result, the organization must ensure that it is not being irresponsible in collecting and protecting data. Otherwise, if problems happen to these stakeholders, they can charge the organization for not protecting the privacy and confidentiality of their data. The organization will then face lawsuits that could have been prevented if it invested time, money, and effort in its semantic security.
  4. I think that some semantic security problems are inevitable because not every IT or manager can determine risks and respond to them swiftly and effectively. I see an opportunity for new products for insurance companies if they can give some form of insurance, in case semantic security problems result in losses to the company. In addition, it can offer security measures, such as building relationships to prevent potential semantic security issues. This means that the insurance company knows how to develop and maintain an emotional connection with users that can prevent them from thinking about using their data access to know more than they should know and use that for illegal or unethical self-gain actions.
Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Wa#2 Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/english/1697191-wa2
(Wa#2 Assignment Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/english/1697191-wa2.
“Wa#2 Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/english/1697191-wa2.
  • Cited: 0 times

CHECK THESE SAMPLES OF Access Security

Cloud Computing Security Models

The main focus of the paper will be to survey the popular cloud computing security models as well as the diverse parameters of cloud security which will involve virtualization, compliance, framework, risk management, dynamic Access Security, internet Access Security and access management.... Cloud computing has a wide range of benefits but it also encounters issues regarding security such as application security, access control, virtualization security, identity management and authentication....
5 Pages (1250 words) Essay

Information Security Skills

ith respect to the evolution of computing threats from simple Access Security to more potent threats of economic crime and terrorism scares on the internet, it is an increasingly important area of concern that requires the appropriate training of professionals such as in this area of study.... The author of the paper "Information security Skills" is interesting to learn how to improve the internal company and national security systems to make them capable of resisting attacks such as hacking which exposes important confidential information to cyber attackers....
2 Pages (500 words) Essay

Implementing Wi-Fi Technology in an Industrial Environment

The advent and adoption of wireless technologies in industrial environments have played a pivotal role in meeting the needs of information access while warranting the mobility of the workforce.... 90) is basically designed to provide wireless connectivity to a user group within premises through a Wireless access Point (WAP)....
7 Pages (1750 words) Essay

A Computer Distributed Banking System

This term paper describes the distributed computing, that has become a common practice in Informational Technology industry during the recent decades.... The researcher of this paper presents the architecture of the core banking system of a medium-sized bank, T-Bank.... ... ... ... The core banking system that supports all main bank operations and discussed in the paper is a distributed client-server system that has a 3-tier architecture....
7 Pages (1750 words) Term Paper

Why New York University

The University offers campus security services including 24-hour vehicle and foot patrols, escort/transport services, regular emergency telephones, sidewalks/lighted pathways, student patrols, controlled dormitory access (security card, keys, etc), and students of legal age are permitted to take alcohol....
1 Pages (250 words) Admission/Application Essay

Data and Support to Katrina Health

The result was out fashioned in the form of 'KATRINA HEALTH' which was initiated as an online service to help people affected by the storm, working with health professionals to gain some sort of access to their lost medical history they were using before the storm and to retrieve it, thus they will be cured accordingly in future....
2 Pages (500 words) Research Paper

W3 Asig Selection Criteria and Data Warehouses

management system (RDBMS) was defined as a “special system software that is used to manage the organization, storage, access, security and integrity of data.... A relational database management system (RDBMS) was defined as a “special system software that is used to manage the organization, storage, access, security and integrity of data....
2 Pages (500 words) Essay

Design the Office for a Company

The security of a building during its design depends on the type and location of the building and also what needs to be secured in such buildings.... This security must or have to depend on the regulations and codes, their relationship with other building systems, the total cost (initial and maintenance), and its flexibility in the foreseeable needs.... It is important to develop the security details during the design of the building.... The building and the design of the security should address various perspectives in keeping the occupants safe; prevention from such hazards as demonstrations and civil disorders, natural disorders, criminal activities, and natural disasters (James 2003, pp....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us