As far as content, this was a great write-up with valid solutions. I would prefer as you go forward that you specific the third-p
As far as content, this was a great write-up with valid solutions. I would prefer as you go forward that you specific the third-party vendor solution, or be more specific. That solution is transferring authority and responsibility to some extent, so you want to know what you are asking for.
do section 3
•Section 3 / compare the three possible solutions from section 2 using the swot (Strength, Weakness, opportunity, & Threat) analysis model (appx four pages).
1
6
Matthew Pankey
Cybersecurity in Data Management at Workplace: Draft
With the ubiquitous and pervasive application of information technology in business organizations' environments, a significant and sensitive amount of data is generated and stored on cloud computing platforms, creating substantial Cybersecurity threats and vulnerabilities Garraghan et al. 2018). In the workforce environment, some fundamental duties and responsibilities involve customers' data management, calling for effective IT-based Cybersecurity customers. Cybersecurity in a workplace occurred in a twofold dimension including the growing data sophistication and data security and privacy compromise due to Cyberattacks and Cybersecurity issues. In the data management role and data manager, collecting and securing data is prone to data breaches and cyber-attackers aging access to sensitive data. Admittedly, Cybersecurity is a fundamental IT-based challenge facing employees, organizations, and stakeholders that require an effective platform for data security and privacy concerns. Thus, Cybersecurity in Data Management at Workplace resonates with fundamental articulation on IT-based challenges in the management information system. Therefore, addressing the topic in detail will offer effective recognition of the IT-based challenges and pragmatic solutions to ensure a secured data management system. Suggesting fundamental Cybersecurity measures to counteract customer data leakage experience is fundamental.
Solutions
Notably, the business case experiences require practical approaches to ensure data privacy and security, limiting possibilities of other customers' sensitive data leakage to unauthorized individuals. Notably, a robust access control, compliance by third-party vendors, employee data security and awareness training, and developing an effective data breach responses plan demonstrate real-time solutions to data breaches in any organization. According to the authors, Data Leakage Protection Based on Context provides an effective platform for data breach and leakage management within an organization, ensuring robust security and privacy concerns (Yu et al. 2018). Similarly, in this analysis of the business, there is an acknowledgment of Data Leakage Protection Based on Context strategy to accommodate access control, compliance by third-party vendors, employee data security and awareness training, and developing an effective data breach responses plan. Thus, a comprehensive explanation of each suggestion to counteract data leakage experience within a workforce, exposing customers' sensitive data to unauthorized personnel is necessary for data security models' decision-making.
Access control
Access control accommodates several models that provide a restrictive platform to ensure that only authorized individuals within an organization have access to sensitive data. Notably, mandatory access control, directory, rule-based, role-based, risk-related, and attribute-based access control models are effective for the security of data. For example, the rule-based access control model offers significant security rules for securing administrator systems. Specifically, access control strategies such as user authentication, verification and identification, password, data encryption and decryption techniques, cryptographic analytics among other access control measures provide an effective platform to restrict unauthorized individuals for effective decision-making.
Similarly, the business case whereby there is a significant Cybersecurity breach, causing customers' sensitive information leakage to unauthorized individuals requires effective articulation on access control strategies user authentication, verification and identification, password, data encryption and decryption techniques, cryptographic analytics for internal and external customers data security in the workplace environment. According to the researchers, effective access control and Cybersecurity policies within domains such as healthcare, finance, education, aviation, and commerce have been effective, embracing robust information management system architecture, accommodating information under control, and significant Cybersecurity requirements within an organization (Mishra et al. 2022). Similarly, the business case, via Data Leakage Protection, Based on Context should accommodate Cybersecurity policies and requirements such as data security, privacy, confidentiality, integrity, and availability to create a secured security infrastructure. Additionally, fundamental access control practices such as user authentication, verification, and identification, password, data encryption, decryption techniques, cryptographic analytics among other access control measures need fundamental applications to ensure internal and external data privacy and security in an organization.
Compliance by Third-Party Vendors
Importantly third-party compliance is a fundamental suggestion for an organization that deals with sensitive data on a cloud computing platform that supports information security. Notably, a business organization that offers regulated data or access to IT systems that contains sensitive data requires fundamental articulation to third-party compliance obligations and requirements. Third-party Compliance requirements accommodate IM and presence services components, compliance server, and support clients that are fundamental for information security from Third-party organizations, accessing sensitive data or IT Systems for business organizations. Specifically, embracing vital steps such as the risk evaluation process, in identifying, segmenting, mitigating, risk, and risk factors for effective third-party preparedness is effective. Similarly, due diligence proportion of risks involving data breaches is effective in third-party compliance requirements. According to the authors, accommodating Cyber Third-Party Risk Management is effective for robust data security within an organization, embracing Company-wide approach strategies for the entire information security coverage (Keskin, et al. 2021). Fundamentally, creating an effective platform for information security through a comprehensive workflow system and a Company-wide approach for risk management is an effective obligation for third-party vendors' consideration. Similarly, the business case should accommodate fundamental considerations to ensure that third-party vendors with authority to access significant and sensitive data meet all the third-party compliance obligations.
Employee data security and awareness training
In the business case, Cybersecurity is a fundamental IT-based challenge facing employees, organizations, and stakeholders that require an effective platform for data security and privacy concerns. Specifically, offering extensive and comprehensive employee training on Cybersecurity and awareness is fundamental in managing internal threats and vulnerabilities of data security. According to the authors, training and creating awareness on information security awareness, accommodating current model and content provides an effective platform for information security, managing internal threats and vulnerabilities to information (Khando et al. 2021). Similarly, the business case on customers' data breach and leakage due to employees lacking awareness and knowledge on data security and privacy require fundamental articulation on information security wares, embracing modern and real-time methods towards effective data management. Notably, training on phishing attacks, password and authentication, physical security, mobile device security, working remotely, public Wi-Fi and Cloud security are underpinning. Importantly, the business organization case requires fundamental employee training and awareness on an information security system for a robust solution on data leakage cases. Thus, employee training and awareness on information security offers knowledge and concepts in preventing data breaches and customers' data leakage in an organization setting.
References
Garraghan, P, Yang, R, Wen, Z., Romanovsky, A., and Xu, J. (2018) Emergent Failures: Rethinking Cloud Reliability at Scale. IEEE Cloud Computing, 5 (5). pp. 12-21.
Khando, K., Gao, S., Islam, S., and Salman, A. (2021). Enhancing employee’s information security awareness in private and public organizations: A systematic literature review. Computer & Security. DOI: 10.1016/j.cose.2021.102267
Keskin, O., Caramancion, K., Tatar, I., Raza, O., and Tatar, U. (2021). Cyber Third-Party Risk Management: A Comparison of Non-Intrusive Risk Scoring Reports, Electronics 2021, 10, 1168. https://doi.org/10.3390/electronics10101168
Mishra, A., Alzoubi, Y., Gill, A., and Anwar, M. (2022). Cybersecurity Enterprises Policies: A Comparative Study. Sensors, 22, 538.
https://doi.org/10.3390/s22020538
Yu, X., Tian, Z., Qiu, J., and Jiang, J. (2018). A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices. Hindawi Wireless Communications and Mobile Computing. https://doi.org/10.1155/2018/5823439
,
Business Case Study structure
This Project Will Be Individual, not a Group project.
The Subject of the case study Will focus on Information technology (IT) Hardware, software, or application solutions to Improve a personal or Business challenge.
Ten Pages Minimum. Full APA-compliant Title and Reference Pages will be in addition to the ten pages of the study.
Ten Scholarly or professional Sources Minimum, Properly referenced and Cited in-Text. Wiki sites and advertisements will not be counted.
American Psychological Association (APA) Formatting is required. This includes headers, margins, indentation, spacing, font, etc.
Business Case Outline
Section 1 (Introduction) / Describe one challenge that you or an organization you have worked for have had which can be resolved with an information technology (IT) hardware, software, or application solution. (Appx one page).
Section 2 / research and describe three possible solutions to the challenge presented in section 1. choose one type of solution (hardware or software) for future comparison (appx three pages).
Section 3 / compare the three possible solutions from section 2 using the swot (Strength, Weakness, opportunity, & Threat) analysis model (appx four pages).
Section 4 (Conclusion) / Identify and Defend the solution (choose one of the three) that provides the greatest benefit to the organization. (appx two pages).
Additional Instructions
This is a Research paper, thus requiring numerous references and citations. The minimum number of references is 10, but all direct quotations and paraphrases must be properly cited in-text, even content from your own previous papers. Your final paper will be submitted automatically through Turnitin and plagiarism will be dealt with according to the university’s policies. When In doubt, cite the source of the information (according to APA formatting) .
You may submit the final paper as many times as you wish. The final feedback from the instructor will come with your draft submission. I will provide corrections, but not so much detail that I feel I am writing your paper for you. I also cannot see any suspected plagiarism until the final submission (through Turnitin), so be cognizant that your draft submission’s feedback will not include that aspect.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.