logo

Strategic Information System (SIS) Assignment

   

Added on  2020-05-11

11 Pages1182 Words207 Views
Running head: PERSONAL IDENTIFIABLE INFORMATION STRATEGYPersonal Identifiable Information StrategyName of StudentName of University

1PERSONAL IDENTIFIABLE INFORMATION STRATEGYAppendix A1. Threat and Risk AssessmentRankRiskDescriptionCategoryCausePotentialResponseAffected assetsProbabilityImpactStatus or recovery time1.Encryptionmethods arenot correctlyimplemented.If there is theabsence of dataencryption,then the systemis not secure.Sometimes thedata present inthe systemmight not beencrypted in aproper manner.This makes theDataprotectionandprivacyImproperimplementationor lack ofsuitableencryptionmethods andalgorithms arethe root causeof this type ofrisk.Immediateactions canbe takenbefore thedata movesto a differentnetwork. Thedata can beprotected byencryptionmethods andalgorithmsThe personaldata of the usersand companyreputation arethe affectedassets.LowHighIt will require approximately1 month for setting up awell-secured system.

2PERSONAL IDENTIFIABLE INFORMATION STRATEGYsystemsusceptible tovarioussecurity threatsand risks.Externalintruders canhackthesystem andmisuse thedata.before itmoves toothernetworks.2.Securitymeasures thatarenotappropriate.If appropriateand strongsecuritypolicies are notincorporated inDataprotectionThe SystemAdministrator isresponsible forincorporatingstrong securityStrongmonitoringof the systemas well as theincorporationThe personaldata of the usersand companyreputation arethe affectedMedium HighIt will take approximately 2weeks to set up.

3PERSONAL IDENTIFIABLE INFORMATION STRATEGYthe system thenthe informationis subjected tovarious typesof attacks. Thiscan causeinformationloss as well asmodification ofdata. features in thesystem. Anykindofnegligence canlead to theimproperimplementationof securitymeasures. of strongsecuritypolicies. assets.3.Human ErrorThese types ofrisks fall underthe category ofaccidental risk.Most of theorganizationsDataprotectionandThe employeesoftheorganizationsare responsiblefortheoccurrence ofImmediateactions mustbe taken toprotect thedata. CorrectencryptionOrganization andthe sensitive dataof the users arethe affectedassets.Medium Medium Proper training of will helpto mitigate the risk. It willtake approximately 1 month.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Personal Identifiable Information Assignment
|26
|5634
|103

Assignment On ICT Risks & Security Concerns
|13
|3436
|93

Mobile Security in MBC Organization Question Answer 2022
|6
|1191
|17

Data Safety considering Ransomware
|17
|3925
|407

Personal Identifiable Information Strategy
|7
|1822
|206

Summary Plan for Risk Mitigation for Information System
|8
|1084
|205