Unit_4_WorkSheet_1
docx
keyboard_arrow_up
School
Lone Star College, CyFair *
*We aren’t endorsed by this school
Course
2279
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
2
Uploaded by EarlBear1147
Unit 4 Privacy Data Security Gaps
Instructions: Review the description of the Request for Proposal (RFP) about the client’s current
information technology (IT) security policy framework, privacy data legal requirements, and the security
gap analysis from the previous unit. Identify each of the security gaps that relate to protecting privacy data
and describe each gap.
Provide a narrative explaining the exposure each privacy data gap represents to the client’s
organization
.
Privacy Data Security Gap
Exposure Explanation
Personnel Background
Investigation
Ensuring that personnel with access to sensitive data receive
appropriate background checks helps prevent internal threats and
unauthorized access.
Segregation of Duties
Lack of segregation of duties can lead to conflicts of interest and
unauthorized access, potentially compromising data security.
Separation of Development and
Production Facilities
Maintaining a clear separation between development and production
environments is essential to prevent security vulnerabilities
introduced during development from affecting production data.
Production Environment Access
Control
Controlling access to the production environment is crucial to
prevent unauthorized users from accessing sensitive data.
Application Control
Proper control over applications is necessary to ensure that they
don't introduce vulnerabilities or unauthorized access points.
Operating System Access
Control
Controlling access to the operating system is essential for
preventing unauthorized users from gaining control of the underlying
infrastructure.
Session Timeouts
Implementing session timeouts helps protect sensitive data by
automatically logging users out after a period of inactivity.
Password Management
A robust password management system is vital for maintaining the
security of user credentials and preventing unauthorized access.
Use of Shared Technology
Resources
Sharing technology resources without ample controls can lead to
security risks and potential data breaches.
Monitoring System Access and
Use
Continuous monitoring of system access and usage is necessary for
detecting and responding to security incidents and privacy breaches.
Event Logging
Proper event logging is essential for tracking system activities and
identifying security incidents or data breaches.
System Development and
Maintenance Control
Having a policy for controlling systems development and
maintenance is critical to prevent the introduction of security
vulnerabilities.
User Registration and
Authorization
Controlling who can register and access the system and ensuring
that they have appropriate permissions is fundamental to data
security and privacy.
Loss of User Privilege
Unauthorized loss of user privileges can lead to security breaches,
so controlling and monitoring privilege changes is important.
Unit 4 Privacy Data Security Gaps
User Privilege Control
Managing user privileges and permissions is essential to prevent
unauthorized access to sensitive data.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help