This website uses cookies to ensure you have the best experience. Learn more

Data Security Essay

1089 words - 5 pages

Lonnie Virgil
Week Seven Case Study
Data security is a critical factor that all individuals and organizations should be concern about. When taking into consideration sensitive data that businesses and individuals hold from financial information to personal information such as social security numbers, any breach in security could be damaging. Data security are methods used to protect data and sensitive information from unauthorized users by preventing unauthorized access to computers, databases and websites (techopedia, 2014). A certain data input/storage/output environment that I came face to face is my frequent visit to Merrick Bank’s online website. As a member of Merrick Bank, I have ...view middle of the document...

The user would have to authenticate their identity again in order to gain access to their account again. In additional, if the website is idle, meaning there is no activity, or the user leaves the computer for a period of time while the website is up, then the website will timeout. The user would have to log back into the system.
As mention previously, Merrick Bank also has a list of security measures that are implemented. For example, Merrick Bank uses secure socket layer. Secure socket layer, or SSL, is a procedure for transmitting data securely across the web (Merrick, 2014). Secure Socket Layer uses a private key for encrypting data that is sent over the connection. Encryption ensures the protection of sensitive information. At the present time, the bank uses 128-bit encryption. Merrick Bank also uses authentication (Merrick, 2014). This method is the only way that users can access their account online. In addition, Merrick Bank implements firewalls to prevent unauthorized users from accessing private networks.
Another security measure that is implemented is an intrusion detection system (Merrick, 2014). The intrusion detection system, or IDS, detects if an unauthorized user is trying to break into the system. It also can detect the whether the system is being misused by legitimate users. The software makes notifications to Merrick Bank when suspicious or illegal activities are detected (Merrick, 2014). Although Merrick Bank has several state-of-the art security measures, there are areas for improvement. One area of improvement is authentication by entering a username and password. Once a username and password is establish, the user will utilize the information to gain access to the system. In my personal experience, I have had my login information compromised.
In my opinion, I think to reduce the risk of a security breach, Merrick Bank should make it mandatory to authorized users to change their passwords every six months. For example, Florida Institute of Technology forces current students to create a new password every few months. In addition, students can’t create a password that was already used. I believe this is a good way of ensuring that sensitive information is protected from hackers. Another suggestion that Merrick Bank can provide their customers is a virtual keyboard. Customers can utilize a virtual keyboard while trying to log into their account. This feature protects their login information, such as their pin...

Other Papers Like Data Security

Course Discription Essay

968 words - 4 pages evaluation should provide details, examples and/or reasons for your viewpoint. 8/19/13 15 Week Three: Data Security Issues and Considerations Details Due Points Objectives 3.1 Identify components of data security. 3.2 Distinguish the differences among the various data security methodologies. 3.3 Begin to apply data security methodologies in situational cases. Reading Read Ch. 11, “Buffer Overflow,” of Computer Security Principles and

Global Security Policy - Week 5 - Cmgt-400

969 words - 4 pages consistency and local relevance. They can quickly be adapted to meet local market requirements. Diageo, a global premium beverage company with offices in 80 countries uses this model. They have created a knowledge repository that helps them standardize functions and materials. An electronic filing system has been created that provides greater data security that meets compliance and privacy laws for multiple countries (Gartside, Griccioli, &amp

Data Management

632 words - 3 pages Data Management Data management is the development, execution and supervision of plans, policies, programs and practices that control, protect, deliver and enhance the value of data and information assets Primary data management functions include: 1. Data Governance Data 2. Data Architecture Management 3. Data Development 4. Database Operations Management 5. Data Security Management 6. Reference & Master Data Management 7

Chapter 1-Introduction to Information Security: Principles of Information Security

979 words - 4 pages transport the data and provides interfaces for the entry and removal od the info form the system. - Physical security polices that deal with hardware a physical assets and with the protection of physical assets from harm and theft. Data: Data stared, processed and transmitted by a computer system must be protected - often the most valuable asset processed by the organization and is the main target of internal attacks. - By the use of

Chapter 1 Review Questions

870 words - 4 pages protection (assuring the security of utility services) related to information security? A. Both infrastructure protection and information security share the same overall goal, which is to ensure that data is available when, where and how it is needed. 4. What type of security was dominant in the early years of computing? A. Early security was entirely physical security. 5. What are the three components of the C.I.A. Triangle? What are they used

Principles of Security 5th Edition Chapter 1 Review Questions

844 words - 4 pages to keep information secured. 7. Describe the critical characteristics of information. How are they used in the study of computer security? Availability ensures that only authorized user have access to information. Accuracy makes sure that the date it has no errors. Authenticity ensures that the data is genuine. Prevents unauthorized user from have access to information. Integrity ensures that information is not damaged or change by

Tjx Technology

580 words - 3 pages . The first security control used in TJX is the Wired Equivalent Privacy (WEP). WEP is a security algorithm for IEEE 802.11 wireless networks. Its intention is to provide data confidentiality comparable to tat f a traditional wired network. WEP is widely in use. There are two methods of authentication for WEP, Open authentication and Shared Key authentication. WEP shares one single WEP key between every node on the network. That means the WEP key

Introduction to Information Security Student

1249 words - 5 pages mainframes and maintain the integrity of their data. 嗗 Access to sensitive military locations was controlled by means of badges, keys, and the facial recognition of authorized personnel by security guards. 嗗 The growing need to maintain national security eventually led to more complex and more technologically sophisticated computer security safeguards. The History of Information Security During these early years, information security was a

Cmgt400 Week 4 Individual

1359 words - 6 pages , and Robert (2006) stated that, “There are many viruses, malware, and hackers that can compromise the security and integrity of an information system. Many remedies that are available for protecting IT systems cannot guarantee security that ensures data protection.” Therefore, deploying protective measures can help lower the level of risks. Implementing organizational tactics, modernized technologies, and processes can help close the gap by

Linux Security

448 words - 2 pages Data Security Standard (PCI DSS), Federal Information Security Management Act of 2002, Control Objectives for Information and Related Technology (COBIT). Many or part of these and more must be taken into consideration while putting this project in play. There are a couple of documents: ISO\IEC 17799 and ISO\IEC 27001. The ISO\IEC 17799 IT security technique is the policy for information security management, guidelines, principles for implementing

Computer Security In Education

330 words - 2 pages university at risk for lawsuits if the information is exposed. Student’s internet use on campus daily comes in contact with social network targeting, malicious software, infrastructure attacks, phishing, and peer-to-peer file transfers (Rasmussen, 2011). These dangers put not only the students’ computers at risk for security breaches, but the universities’ network as well. The damages resulting from data breaches in college networks are numerous. Not only

Related Essays

Data Security Essay

1110 words - 5 pages Lara Ramey Southern New Hampshire University OL 442 – Professor David Miller April 25, 2015 Final Paper: Data Security With technology taking over businesses and costs rising higher by the year, having a solid data security policy in place is an extremely beneficial and important part of protecting an organization. Sinrod (2010) discusses how financially damaging data breaches can be for an organization, with an average cost of $6.75

Computer Data Security Essay

838 words - 4 pages Every business from the small auto shop in our neighborhood to a big national corporations are worried about the same thing, keeping sensitive data safe, either by storing the physical paper work in a secure room or by strengthening computer security measures. Data needs to be handling with care and monitored all the time to make sure that the integrity of files has not been corrupted. Plus, data collected and stored in serves needs to be

Data Management Policy Essay

2611 words - 11 pages which covers the collection, storage, security, maintenance and dissemination of administrative data throughout the University. Roles responsible and accountable for data collection, storage, security, maintenance, dissemination and data quality. Scope: This Policy provides a comprehensive data management framework which is consistent across all of the University’s major Information Systems (Finance, Student, HR and Course Information – see

Impact Of Data Classification Standard Essay

596 words - 3 pages Impact of Data Classification Standard and Internal Use Only Data classification standard provides the means of how the business should handle and secure different types of data. Through security controls different data types can be protected. All these security controls should apply to each of every IT infrastructure in which it will state how the procedures and guidelines will guarantee the organization’s infrastructures security. This