Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Write a reponse for this post, only need 70 words+ with your ownwords, -- There

ID: 3844547 • Letter: W

Question

Write a reponse for this post, only need 70 words+ with your ownwords,

--

There is a lot of security related issues the purchasers should have on this article. All of these issues come from the fact that companies do not consider security as one of the factors to be discussed when buying new technology. They consider a lot of other factors though, such as cost, efficiency, customer satisfaction, etc. they do not consider the fact whether the product is secure or not though, and whether their customers’ data would be secure if used by the new product.

One specific problem stated in the article was the fact that companies do not want to fall behind technology wise, therefore want to always invest in the newest most innovative technology. By using these new devices connected to the internet though, they increase the security flaws of the company and make it more attractive as a target for the attacker.

The article also mentions small startups, which while constantly trying to cut expenses, always sacrifice the security of their services or products first.

The concerns of the purchasers should increase taking into considerations the risks their information is facing on these companies which do not value security. Some of the advices mentioned on the article for the organizations to mitigate security related risks are things customers should do too. They can not probably ask if there has been security testing by the company, because I would assume the company is going to always say yes, but they could always ask about what would happen if something happened to their data and if they would be notified immediately and what policies the company has in place to protect their data.

Reference:

Matwyshyn, A. (2017) The big Security Mistakes Companies Make When Buying Tech. Retrieved from: https://www.wsj.com/articles/the-big-security-mistakes-companies-make-when-buying-tech-1489372011

Explanation / Answer

It's very true that companies now a days investing more and more money to get the new and advanced technology, and they dont take about the security concerns related to it. They don't care, how much their customre data like personal details, credit and debit card details are secured. Its unltimately causing us as a common citizens. According to my we each organization should follow the security recommendations given below:

1. Secure the wifi network, so than any unauthorized user done not get access to network and get paitent information and their data.

2. Use latest antivirus software to keep your desktop safe from malicious virus.

3. Proper access rights should be given to the staff of physician office, only auhorized users can have access to paitent reports.

4. Operating system of desktop should be upgrade too.

5. Key focus on Operating Syatem Files: With in the computer systems, authorization policies should be implemented on the disk having operating system files, so that unauthorized user can not do any modification there.

6. Key Focus on Password Policies: Focus should be given the passwords of the system as well as of various applications. The strong password policies should be implemented

Comapnies should also implement the security life cycle model with in the organization. The details of this model is given below:

Security Life Cycle Model: This model is being used to maintain atleast a minimum required security in networks as well as in industrial control systems. This model include following given steps:

1) Identify: Here in this very step, ve identify the various resource, that we have look for the security issues. In the other way, we can say that, here in this step, we identify, what we need to protect or look for the security issues.

2) Asses: As in the first step various assets have been identified, so now in this step, we perform a security assessment on the resources as well as assets identified on the very first step. Here in this step we take care of various aspects of processes as well as of procedures to look for vulenrability as well as of security concerns. On the bases of the assessment, we derive the security issues as well as the security results, which tells about the security related issues of resource as well as of assets.

3) Protect: Here in this step, we work on the security issues found in the assessment step. Here we try to protect our procedures as well as the processes for security threats. We work on the security issure related results and try to protect and mitigate each and every resources involved in the process.

4) Monitor: After protecting the resources and the processes, we have to keep monitoring it, monitoring is required so that same process, procedure or the resource does not show the security concerns again.

So we can say the security life cycle model is to devlop a security plan that can results in to the imporoved security of our systems as well as of networks. It also provide a model to continuously monitoring our systems and the resources. Security life cycle provides us the process in which one step leads to the second step and
these step wise activities provide us refine and secure system. This security model is the process that must be executed continuously, as its an ongoing process that help the system in security related issues

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote