FuturePlus: Security Measures to Prevent Unethical Data Handling

Verified

Added on  2022/09/22

|2
|765
|18
Report
AI Summary
This report provides a detailed analysis of security measures that FuturePlus should implement to prevent its staff, including casual workers, from handling information unethically. The report recommends securing the donor database through encryption using algorithms like AES to mitigate risks such as unauthorized access and data corruption. It emphasizes the importance of accountability and auditing through security team checks and the analysis of data stored on servers. Role-Based Access Control (RBAC) is proposed to grant employees access rights based on their roles. The report also addresses 5G network security, suggesting the deployment of a 5G security architecture to counter attacks, and recommends the installation of firewalls. Furthermore, the report stresses the creation and enforcement of security programs and policies, along with the implementation of security measures for portable devices, including strong passwords and anti-virus software. The report references several academic sources to support its recommendations.
Document Page
Topic - Security measures that FuturePlus should take to prevent its staff
members, including casual staff from handling information unethically
Secure donor database through encryption
The security risks to the donor database such as unauthorized access, data corruption,
unauthorized disclosure, identity theft, etc. will be mitigated by FuturePlus organization by
implementing the best encryption algorithm like AES. This security measure will allow all
professionals to manage corporate data and information in an ethical manner (Gaikwad and
Raut, 2014).
Accountability and auditing
Audit checks and accountability should be performed by the security team in the FuturePlus
organization for ensuring data integrity & confidentiality. Moreover, the organization can
analyze data stored on servers for access, accountability, and authentication of a user.
RBAC models
The top management of FuturePlus organization has been recommended to prefer RBAC
(Role-Based Access Control) technique to provide authorization to all employees including
Operating Manager, a Planning Officer, two Case Officers, an Accountant and causal staff
members on the basis of their roles. This technique will help the organization to provide only
limited access rights to all workers. This type of security measure supports two types of
constraints based on the separation of duties i.e. dynamic constraints and static constraints
(Gaikwad and Raut, 2014).
5G network security
Attackers can compromise the privacy, confidentiality, security, and integrity of corporate
data by targeting the weak points of the 5G network. MITM (Man-in-the-middle attack),
identity theft attack, flash network attack, DDoS attack, DoS attack, etc. can be performed by
attackers for accessing donor data stored and misused by the charity organization. FuturePlus
organization should deploy 5G security architecture which consists of crypto algorithms, key
agreement, authentication/authorization, security management, security orchestration, SDN
security, NFV security, network slicing security, intelligent security controls, etc. security
components for dealing with security attacks associated with 5G network (Sharevski, 2018).
Install and maintain firewalls
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
According to case details, the 5G network has been used by causal workers for sharing
captured data of students and donors to officials. In order to restrict unauthorized traffic
access to the official 5G network, there is a need to implement firewalls (Arfaoui et al.,
2018).
Create and enforce security programs and policies
The organization must create and enforce security program which will describe the security
controls that can be considered and used by workers while gathering, storing, using and
managing information of donors and students (Gaikwad and Raut, 2014).
Security of portable devices
According to the case study details, causal workers are using a laptop, PDA, mobile devices,
etc. to store and transfer captured donor and student data. They should use strong passwords
and install anti-virus software for managing the security of portable devices. AES 128/256 bit
algorithm is a strong encryption technique which will be implemented by the organization to
secure all sensitive data of students as well as donors. The senior management has been
suggested to create acceptable-use and security policies for securing portable devices &
educating all workers about these policies (Ghuman, 2013).
References
Arfaoui, G., Bisson, P., Blom, R., Borgaonkar, R., Englund, H., Felix, E., Klaedtke, F.,
Nakarmi, P., Naslund, M., O'Hanlon, P., Papay, J., Suomalainen, J., Surridge, M., Wary,
J. and Zahariev, A. (2018). A Security Architecture for 5G Networks. IEEE Access, 6,
pp.22466-22479.
Gaikwad, T. and Raut, A. (2014). A Review on Database Security. International Journal of
Science and Research (IJSR), [online] 3(4). Available at:
https://www.ijsr.net/archive/v3i4/MDIwMTMxMjc3.pdf [Accessed 18 Aug. 2019].
Ghuman, S. (2013). Database Security. International Journal of Computer Science and
Mobile Computing, [online] 2(3). Available at:
https://ijcsmc.com/docs/papers/February2013/V2I2201317.pdf [Accessed 18 Aug.
2019].
Sharevski, F. (2018). Towards 5G cellular network forensics. EURASIP Journal on
Information Security, 2018(1).
chevron_up_icon
1 out of 2
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]