This website uses cookies to ensure you have the best experience. Learn more

Information Security Essay

3941 words - 16 pages

COM656 Group Project Security Plan
Chunlin Yang
Yunzhen Li
Peng Yu
Yun-Chen Tsao
Coleman University

COM656 Group Project Security Plan
A brief description of the company
Company size, employees numbers, Customers
Canon Inc is a multinational corporation specialized in the manufacture of imaging and optical products, including cameras, camcorders, photocopiers, computer printers and medical equipment. It has about 190,000 employees worldwide by end of 2015. Canon has Personal, Office, Professional, Industry business sectors, provide products and services to many millions of customers in each sector globally.

History Summary
From its humble beginnings in a 1933 Tokyo ...view middle of the document...

Those plans prompted Canon to drop "Camera Company" from its name in 1969, becoming simply Canon Inc.
The following year Canon unveiled the first plain paper copier machine, which helped Canon grow to a company with over 5,000 employees and sales of more than 44 billion yen. In the 1970s and 1980s, Canon developed the world's first laser printer, the world's first personal copy machine, which was built around an all-in-one cartridge system, the world's first inkjet printer, and then a full-color digital copying machine. The rest is history, as they say.
Today, Canon is known the world over as the standard to beat when it comes to imaging technology. With such success, you might think that Canon wouldn't care much for the environment, but they do.
In fact, in 1990, when going green wasn't hip or cool, Canon launched its toner cartridge collection and recycling program—a great public relations move that forced other imaging companies to follow suit and one that launched the market for remanufactured printer ink cartridges.
Today, remanufactured cartridges are available at great savings to not only our pocketbooks, but also to the environment—and we owe it all to Canon's innovative mindset and environmental consciousness. (Dale, 2011)
Corporate Vision and Mission
Canon’s Vision is Kyosei. Kyosei, a Japanese idea, means conveying “dedication to seeing all people, regardless of culture, customs, language or race, harmoniously living and working together in happiness into the future.” Canon acknowledges that economic factors can prevent the realization of kyosei. They want to create good relationships with customers, communities, governments, regions, and the environment to fulfill their corporate social responsibility. Overall, Canon’s ambition is to add to “global prosperity and the well-being of mankind as [they] continue [their] efforts to bring the world closer to achieving kyosei.” (Canon, 2016)
Sensitive Information the company contains or uses
Canon has below sensitive information, our security plan will protect them. As Per Sun wu, one who knows both himself and also knows the enemies will not be in danger in 100 battles. One who does not know himself and does not know his enemies will be in danger in every battle. In the security plan we design for Canon Inc, we know that our security plan will protect below sensitive information, Employee Information, Customer Information, Trade Secrets.

Employee Information
Canon recognizes that personal information is an important asset, and protecting this asset is one of its social responsibilities especially considering Canon has about 190,000 employees worldwide. We help Canon Inc. established the Personal Information Protection Policy and the Personal Information Protection Rules, with the Corporate Audit Center performing internal audits. Canon continue to bolster its management system while also stepping up training to ensure that all employees that handle personal information...

Other Papers Like Information Security

Information Security Audit Essay

1093 words - 5 pages Information Security Audit Name Institution Information Security Audit When conducting information security audit may people tends to confuse it with information systems audit. Information system audit is a substantial, expansive term that envelops boundary of obligations, equipment an server administration, incidents and problem administration, safety, network division, privacy and security assurance (Pathak, 2004). Then again, as the

Principles Of Information Security Essay

3291 words - 14 pages Principles of Information Security Fourth Edition Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional

Principles of Information Security

3241 words - 13 pages Principles of Information Security Fourth Edition Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove

Information Security Modification Recommendations

1323 words - 6 pages Tft2 Task3 In: Computers and Technology Information Security Modification Recommendations Service Level Agreement Between Finman Account Management, LLC, Datanal Inc., and Minertek, Inc. After careful review of the current Service Level Agreement(SLA) “A Service Level Agreement for Provvision of Specified IT Services Between Finman Account Management, LLC, Datanal, Inc., and Minertek, Inc.” we have determined that standard Information

Information System Security

1267 words - 6 pages ) for the back-up scheduling time cycle. Solution 7: The corporate security policy is out of date and each branch office differs, so you must research and define security operations and administration including the identification of information assets and documentation of policies, standards, procedures, and guidelines that ensure confidentiality, integrity, and availability. Business Continuity Plan: Richman needs to set down and revive the

Information System Security

1538 words - 7 pages . This has been mainstreamed into Linux and ported to several other systems, including the Solaris™ operating system, the FreeBSD® operating system, and the Darwin kernel. This provides a mechanism to enforce the separation of information based on confidentiality and integrity requirements and it allows threats of tampering and bypassing of application security mechanisms to be addressed while enabling the confinement of damage that can be caused

Principles Of Information Security

307 words - 2 pages essential part of every IT organization’s ability to sustain long-term competitiveness. When an organization depends on IT-based systems to remain viable, information security and the discipline of risk management must become an integral part of the economic basis for making business decisions. These decisions are based on trade-offs between the costs of applying information systems controls and the benefits realized from the operation of secured

Hipaa and Information Security

1176 words - 5 pages Darl A. Hammacher Jr. IST 293 21 July 2013 HIPAA and Information Security In a society where you can find out nearly everything about a person by simply using the internet, there are still certain aspects of people’s lives that remain private thanks to certain federal and state laws. These laws have been enacted to not only maintain privacy of patients, but to reduce costs and fraud in the field they are related to. The continued growth of

Information Systems Security

4584 words - 19 pages Fundamentals of Information Systems Security 1E REVISED 38351_FMxx_ttlcp.indd 1 8/1/12 1:00 PM 38351_FMxx_ttlcp.indd 2 8/1/12 1:00 PM Contents Ethics and Code of Conduct Preface LAB #1 ix vii Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Introduction Deliverables Hands-On Steps 1 1 3 14 15 2 Learning Objectives 1 Evaluation Criteria and Rubrics LAB #1 ASSESSMENT WORKSHEET LAB #2 Perform a

Information Security Policy

1790 words - 8 pages . Not transmit copyrighted materials without permission. 4. Know and abide by all applicable Hano policies dealing with security and confidentiality of company records. 5. Run a virus scan on any executable file(s) received through the Internet. 6. Avoid transmission of nonpublic customer information. If it is necessary to transmit nonpublic information, employees are required to take steps reasonably intended to ensure that information is

Chapter 1-Introduction to Information Security: Principles of Information Security

979 words - 4 pages Chapter 1-Introduction to Information Security: 1. What is the difference between a threat and a threat agent? A threat is a constant danger to an asset, whereas a threat agent is the facilitator of an attack. 2. What is the difference between vulnerability and exposure? Vulnerability: is a fault within the system, such as software package flaws, unlocked doors or an unprotected system port. It leaves things open to an attack or

Related Essays

Information Security Essay

988 words - 4 pages Human differences Human beings are prone to certain characteristics that tend to affect their relation to information security. Information security refers to the ability of an individual to ensure that information is free from any kind of access by unwarranted individuals. There are several human inadequacies that affect the level of information security. However, this discussion is going to concentrate on three major human characteristics

Information Security Essay

1990 words - 8 pages Running Head: INFORMATION TECHNOLOGY Information Security Introduction Information security is understood to be the way wherein which information is being secured within the organization. It is a must to check it upon that thing are likely to be understood at its best. It is a must to identify that organization should make it sure that all the confidential information is being protected and is safe from any kind of attack. The

Information Security Essay

1620 words - 7 pages 1. Why is information security a management problem? What can management do that technology cannot? Management is responsible for implementing information security to protect the ability of the organization to function. They must set policy and operate the organization in a manner that complies with the laws that govern the use of technology. Technology alone cannot solve information security issues. Management must make policy choices and

Information Security Evaluation Essay

633 words - 3 pages Information Security Evaluation CMGT 441 June 16, 2014 Information Security Evaluation Introduction In today's age where technology is constantly developing and shifting faster than most individuals can recognize, one feature stand dependable is company resources. Of these resources, none seems more significant in the age of instant media than information. Safeguarding information can be crucial to a failure or achievement of the