Continuing Case Study Chapter 8
docx
keyboard_arrow_up
School
Regent University *
*We aren’t endorsed by this school
Course
406
Subject
Information Systems
Date
Jun 22, 2024
Type
docx
Pages
3
Uploaded by GeneralFreedomDinosaur4458
Continuing Case Study
Chapter 8
1. For the prototype user interface, design a switchboard that leads from the main sections to sub-sections of related system tasks. The main sections may include member information, registration, payments, fitness instructors, and any other top-level sections necessary for Personal
Trainer’s system. Subsections may include account information, class registration, schedules, and
class rosters. Prepare storyboards that show the proposed screens, including at least two
sublevel tasks for each action
4. Personal Trainer is very concerned about the security and protection of the information they
collect in the new information system. Prepare a memo to Gray and Personal Trainer’s staff
that explains the input and output security controls that will be built into the new systems
and the policies that will enforce these controls.
Subject: Information System Security Controls and Policies
To: Gray and Personal Trainers Staff
From: Susan Park
Date: June,16,2024
Submit
Class Roster
Schedules
Class Registration
Personal Training INC.
Account Information
Payments
Fitness Instruction
Member Information
Registration
Dear Team,
I am writing to emphasize the critical importance of security and protection for the information we collect in our new information system. Safeguarding the confidentiality, integrity, and availability of this data is paramount to our operations. To achieve this, we are implementing stringent security controls and enforcing policies to govern these measures. Please take a moment to acquaint yourself with these protocols.
Input Security Controls:
Data Encryption: All the data exchanged between your application and our information system will be encrypted using industry-standard protocols to prevent
its unauthorized interception.
Access Controls: This shall be ensured by restricting the access to the system through role-based permissions, which guarantees access for feeding data only to authorized personnel. It is further supported by multi-factor authentication to provide security in logging into the system.
Data Validation: Input data will be validated strictly so that no malicious or incorrect data can be fed to the system.
Audit Trails: An audit trail of all data inputs shall be maintained and thus provide a record of the changes addressed within the system.
Output Security Controls:
Data Encryption: Similar to the input data, all data fetched from the system shall be encrypted so that it provides safety during transmission..
Access Controls: This means that specific output data types will be available only
to authorized persons; that is, role-based access controls.
Data Masking: Sensitive data shall be masked or redacted whenever necessary to prevent unauthorized exposure.
Secure File Transfer: Wherever reports or data need to be shared outside, appropriate secure protocols and methods will be applied to the information in transit.
Security Policies:
Data Classification: The sensitivity of the data will be ranked, and access controls
will be implemented in line with those rankings.
Password Policies: In this regard, password policies incorporating regular change and complexity will be implemented.
Data Retention: These policies of data retention, if clearly articulated, will define exactly the kinds of information maintained, the duration for which we may retain
them, and when it should be disposed of securely.
Incident Response: Clearly outlined incident response plan for effective handling of security breaches or incidents in the best manner, should such occur.
Training and Awareness: Conducting training and creating awareness on an ongoing basis would mean that every responsible would have the necessary information required for the safekeeping of his/her information or company’s property.
Let us note that these security measures are in place not to slow you down but to safeguard our clients and our institution’s data. It is the duty of all of us to help keep the place safe. I appreciate your prompt consideration in this matter.
Thank you for your attention to this matter.
Sincerely,
Susan Park
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help