CSIA 301: Case Study

2029 Words9 Pages
Fall 2011 CSIA 301 –Section [6383] Instructions: Based on the following scenario, respond to the four (4) Exam Questions / Discussion Topics below. Your responses should be written as if you are discussing with/presenting to the CEO, each question will require a minimum of 3 well written paragraphs and answers should not exceed 4 paragraphs and 400 words) Your responses should demonstrate your understanding of the course content and your analysis and critical thinking; you are not expected to just re-iterate what is in the textbook and the course modules, but to integrate the information and relate it to the Case Study. Proper APA style must be used for any citations and references that you use. Place your answers within this document…show more content…
Regulatory frameworks are requiring organizations, like yours to implement the necessary safeguards to ensure the confidentiality, integrity and availability of information. (Khansa & Liginlal, 2009, p. 1) The importance of information security cannot be over-emphasized. It is imperative that you invest in information security as it comes with protection and resilience against malicious attacks. According to Khansa & Liginlal, if we prevent malicious attacks on this company, monetary damages from attacks would be reduced and customers’ information would be saved from compromise, preventing any negative publicity for this company, (Khansa & Liginlal, 2009, p. 17) In a nutshell, information security tries to set security controls to prevent theft or damage to data or assets on your computer. The damage could be from internal or external. An employee could unintentional give out company information just because they are not trained as to how to handle some sensitive information. There are also the intentional internal threats that result from employees taking advantage of security flaws. There are also the skilled external criminals who aim at destroying or stealing data. With information system security, you are assured of quality measures to prevent all these kinds of situations by identifying…show more content…
Discuss technology recommendations to meet the future business direction. Be sure to include a rationale for the security requirements and the business need for each priority. Discuss appropriate policies, regulations and technologies to ensure that field data/information is handled properly and securely when used, processed and transported via a laptop or tablet computer. Where appropriate, your recommendations should align with the vulnerabilities you identified in Q. 3. If the company is looking into using laptops and Internet access in the field, then it must consider encryptions. According to Pfleeger & Pfleeger, “encryption is powerful for providing privacy, authenticity, integrity, and limited access to data” (p. 444). I would suggest “end-to-end encryption” this is known to provide encryption from one end of transmission to the other” (p. 446). This way, information transmitted from the field would be in encrypted throughout the network. “When end-to-end encryption is used, messages sent through various hosts are protected” (Pfleeger & Pfleeger, 2007, p.
Open Document