Premium Essay

Security and Information Sharing Model

In:

Submitted By Jagrace
Words 381
Pages 2
To set up a security and information sharing model for the company, it will be much better to utilize a manager security structure through Active Directory than through Workgroups. The reason for this is that there are many different departments within the company. Some information should only be available to specific users within various departments (such as managers). Other information should be available to all employees (employee handbooks, calendars, etc) and still other information should be accessible to only certain groups of people in specific departments (accounting, payroll, etc.)
By instituting a managed security structure, it will be much easier to manage the access to resources and the addition or removal of users and/or access to these resources as the company grows and changes.

The file/print/application architecture will be a client/server architecture so that the management of access to information and resources is in the hands of the network administrator as opposed to the individual users. This is an obvious security measure in any company dealing with sensitive information which should not be shared with all employees. Also this will create a centralized management system for the access to information and resources, making it easier to institute changes across the board.

It would be very beneficial to create security group memberships in Active Directory, for the centralized and timely management of security. Simple changes to the security groups could allow or disallow access to sensitive data for individuals or groups, and could be done instantaneously. Also, this type of security management allows for changes to be made in a more efficient way compared to manual creation of security for certain files and folders.

To ensure that security is maintained, it would be critical to plan the different groups, group membership, access

Similar Documents

Premium Essay

Homelndsecurity

...HOMELAND SECURITY Terry Davis CJAD 495 Professor R. Moser Introduction Since the birth of this nation, there has been concern for security and freedom of all the citizens of the United States. We have fought wars across our nation, across borders and across the globe, all in the pursuit to protect our freedom and the American way of life. There have been many threats against the American pursuit of freedom that started with the Revolutionary War, a young nation fighting to break away from a nation of strength. Then our battle over land expansion and the taking of the land from the Native Americans, some perceived them as savages or maybe even terrorist. Then we turned to secure our borders to prevent other nations from coming into our nation and grabbing up land. Then our pursuit of freedom expanded the globe and with other nations as we assisted in the attempt to spread democracy in countries struggling to become nations. In this attempt, there have been many enemies formed that despise the US and the pursuit of freedom. This has become a major concern of the US and on September 11, 2001, this concern became a reality. How could something so devastating be carried out against a world-leading nation? What was wrong with the infrastructure and how could it be fixed to prevent other terrorist attacks. The answer was to form a department in the federal government that would have the power to act and the power to share intelligence information. Terrorism and US Threats ...

Words: 3262 - Pages: 14

Premium Essay

Sample Tester Page

...Computer Security Incident Handling Guide Recommendations of the National Institute of Standards and Technology Paul Cichonski Tom Millar Tim Grance Karen Scarfone Computer Security Incident Handling Guide Recommendations of the National Institute of Standards and Technology Paul Cichonski Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division Department of Homeland Security Tim Grance Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Karen Scarfone Scarfone Cybersecurity NIST Special Publication 800-61 Revision 2 COMPUTER SECURITY August 2012 U.S. Department of Commerce Rebecca Blank, Acting Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology...

Words: 32495 - Pages: 130

Free Essay

Dsadsa

...Introduction and Abstract Copyright(c), 1984, Fred Cohen - All Rights Reserved This paper defines a major computer security problem called a virus. The virus is interesting because of its ability to attach itself to other programs and cause them to become viruses as well. There are two spellings for the plural of virus; 'virusses', and 'viruses'. We use the one found in Webster's 3rd International Unabridged Dictionary Given the wide spread use of sharing in current computer systems, the threat of a virus carrying a Trojan horse [Anderson72] [Linde75] is significant. Although a considerable amount of work has been done in implementing policies to protect from the illicit dissemination of information [Bell73] [Denning82], and many systems have been implemented to provide protection from this sort of attack [McCauley79] [Popek79] [Gold79] [Landwehr83], little work has been done in the area of keeping information entering an area from causing damage [Lampson73] [Biba77]. There are many types of information paths possible in systems, some legitimate and authorized, and others that may be covert [Lampson73], the most commonly ignored one being through the user. We will ignore covert information paths throughout this paper. The general facilities exist for providing provably correct protection schemes [Feiertag79], but they depend on a security policy that is effective against the types of attacks being carried out. Even some quite simple protection systems cannot be proven 'safe' [Harrison76]...

Words: 8970 - Pages: 36

Premium Essay

Cloud Systems or It Organisations

...Secure Data Sharing in the Cloud Danan Thilakanathan, Shiping Chen, Surya Nepal and Rafael A. Calvo 1 Introduction Cloud systems [1, 2] can be used to enable data sharing capabilities and this can provide an abundant of benefits to the user. There is currently a push for IT organisations to increase their data sharing efforts. According to a survey by InformationWeek [3], nearly all organisations shared their data somehow with 74 % sharing their data with customers and 64 % sharing with suppliers. A fourth of the surveyed organisations consider data sharing a top priority. The benefits organisations can gain from data sharing is higher productivity. With multiple users from different organisations contributing to data in the Cloud, the time and cost will be much less compared to having to manually exchange data and hence creating a clutter of redundant and possibly out-of-date documents. With social networking services such as Facebook, the benefits of sharing data are numerous [4] such as the ability to share photos, videos, information and events, creates a sense of enhanced enjoyment in one’s life and can enrich the lives of some people as they are amazed at how many people are interested in their life and well-being. For students and group-related projects, there has been a major importance for group collaborative tools [5]. Google Docs provides data sharing capabilities as groups of students or teams working on a project can share documents and can collaborate...

Words: 13400 - Pages: 54

Free Essay

Test

...closest: “Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject’s response to that menace or hazard.” The Need to Know Clearly, going beyond simple event-based data analysis is a prerequisite for any useful threat intelligence program. The problem is that many organizations don’t know enough about the threats they face or their own security posture to defend themselves adequately. Instead they’re stuck in a reactive “stop the bleeding” or compliance-driven approach to cyber security with no clear vision or blueprint for reaching any other state. So it goes that in the rush to keep up with the TI trend, organizations are purchasing standalone solutions that have little value in helping them achieve a true proactive posture and efficiently orchestrate security solutions and processes throughout the organization to achieve maximum value. Yet, it’s not enough to implement new controls and technologies around systems. In order to fully harness the power of TI, 3865 WILSON BLVD. | SUITE 550 | ARLINGTON, VA 22203...

Words: 3324 - Pages: 14

Premium Essay

Global Security Policy - Week 5 - Cmgt-400

...Global Security Policy CMGT-400 Monday, May 11, 2015 Vijay Bhaskar Jonnalagadda Global Security Policy Organizations with offices in multiple countries have to strategically implement personnel, logistics, network configurations, and inventory; but they also have to create a security plan to secure these assets to keep their customer, brand integrity, and profits. Some of the issues faced while maintaining security for a company in multiple countries across the globe are personnel, cyber threats, and cloud computing. Managing Human Resources Employees of global organizations and mobile businesses have great challenges while trying to protect sensitive information. Cisco commissioned a third-party market research firm, InsightExpress to conduct a study of IT professionals around the world generating 2000 respondents of end users and IT professionals. They found that employees can put personal and corporate data at risk because of the following (Cisco, 2008): 1. Unauthorized application usage possibly caused company data loss 2. Misuse of corporate computers by sharing with other employees without supervision 3. Unauthorized physical and network access 4. Employees transferring files from work and personal computers when working from home. 5. Employees sharing passwords with co-workers. The organizational structure involves balanced leadership and board diversity. Even though the offices are in multiple locations, the company's structure must allow...

Words: 948 - Pages: 4

Premium Essay

Database 1

...Controlling Data redundancy b) Data Consistency c) Data Sharing d)Data security Disadvantages:- a) Cost of hardware and software b) Cost of data sharing c) Database Failures d) Complexity 3. Identify some informal queries and update operations that you would expect to apply to the database shown in Figure 1.2.? Ans: The database has shown the student information for smith and brown. It also represents the course details. Then it shows the intake of the subject and instructor. In grade report section its display the grade result of smith and brown. Also it illustrates the prerequisite for the major subject. From this Database we can get the information of student, course details, course instructor, prerequisite for the major subject and grade report of the student. 4. Discuss the capabilities that should be provided by a DBMS? Ans:- i) Restricting Unauthorised access ii) Providing multiple user interface iii) Controlling redundancy iv) Providing backup and recovery v) Providing persistence storage for programs object and vi) Representing complex relationship among data vii) Enforcing Integrity constraints 5. List the responsibilities of the database manager. For each responsibility, explain those problems that would arise if the responsibility were not met? Ans: responsibilities of data manager: a) Interaction with the file manager b) Integrity enforcement c) Security reinforcement...

Words: 521 - Pages: 3

Premium Essay

Cloud Computing

...What’s New About Cloud Computing Security? Yanpei Chen Vern Paxson Randy H. Katz Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2010-5 http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html January 20, 2010 Copyright © 2010, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. What’s New About Cloud Computing Security? Yanpei Chen, Vern Paxson, Randy H. Katz CS Division, EECS Dept. UC Berkeley {ychen2, vern, randy}@eecs.berkeley.edu ABSTRACT While the economic case for cloud computing is compelling, the security challenges it poses are equally striking. In this work we strive to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions. We examine contemporary and historical perspectives from industry, academia, government, and “black hats”. We argue that few cloud computing security issues are fundamentally new or fundamentally intractable; often what appears “new” is so only relative to “traditional” computing of the past several...

Words: 5878 - Pages: 24

Premium Essay

Cloud Computing

...Cloud computing Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user's data, software and computation. There are many types of public cloud computing:[1] Infrastructure as a service (IaaS) Platform as a service (PaaS) Software as a service (SaaS) Storage as a service (STaaS) Security as a service (SECaaS) Data as a service (DaaS) Database as a service (DBaaS) Test environment as a service (TEaaS) Desktop virtualization API as a service (APIaaS) Backend as a service (BaaS) In the business model using software as a service, users are provided access to application software and databases. The cloud providers manage the infrastructure and platforms on which the applications run. SaaS is sometimes referred to as “on-demand software” and is usually priced on a pay-per-use basis. Saas providers generally price applications using a subscription fee. Proponents claim that the SaaS allows a business the potential to reduce IT operational costs by outsourcing hardware and software maintenance and support to the cloud provider. This will enable a business to reallocate IT operations to focus on other IT goals. In addition, the application is hosted centrally, so updates can be released without users...

Words: 5808 - Pages: 24

Premium Essay

Supply Chain

...The Impact of “Cloud Computing”-based Information Sharing on Supply Chain Li YiPeng, Zhongnan University of Economics and Law, School of Information and Safety Engineering, Wu Han, China, Lyp2357@163.com The research presented in this publication uses both analytical and methodological approach through mathematical models to exploit a real time information sharing based on “Cloud Computing”. The author has clearly provided type, limitation and limited orientation to the following terminologies with respect to the scope of is research and publication: Type of Information Shared, The pertaining definitions of Information Measurement, Quantitative and Qualitative Measurement of Information, Accelerating Physical Flow, Scope of Uncertainty in the Supply Chain, Building Cloud Computing Platform in Supply Chain. The methodological approach is also provided to find the optimal solution for information sharing in a cloud computing scenario, the study uses a mathematics optimization model by including variables such as Product, Consumer (computed through Poisson Process, Auto Regression, ARIMA and Stationary Demand), Retailer and Manufacturer. The results of this study are very important to supply chain practitioners. It can be used as benchmark to assess the impact and value of cloud computing in the supply chain. It is the cloud computing platform’s task to make the partners using the information service more easily and conveniently. To those middle and small-sized companies...

Words: 1009 - Pages: 5

Premium Essay

Studyguide for Nt1210 Mid Term

...Systems Interconnections (OSI) Model • IP Addressing • Firewalls TCP/IP for Wired and Wireless Networks[1] TCP/IP is an open-standard communications protocol suite that is the standard for communicating on the Internet • TCP and IP (two different protocols) contain all the fundamental mechanisms needed to support any and all types of networked communications • TCP/IP was developed as part of the ARPAnet project in the 1960’s (the early development of the current Internet) • TCP/IP became a unifying and reliable element that enabled interoperability across incompatible systems • One of TCP/IP's most basic yet critical functions is its preparation of application data for transmission across a network. • TCP/IP accepts data of virtually any size from applications (typically in the form of a file) and chops it up into smaller, more manageable chunks called segments (segmentation) • In communicating, TCP handles flow control, IP handles addressing • Being a suite of different protocols, TCP/IP includes such protocols as DNS, DHCP, http, ftp, POP3, SMTP and TELNET. Other TCP protocols may be found at http://www.protocols.com/pbook/tcpip1.htm The Open Systems Interconnections (OSI) Model The most common way to illustrate the communication process of segmentation and packetization is through the Open Systems Interconnections (OSI) Model • The OSI model is a seven layer stack of processes...

Words: 1931 - Pages: 8

Premium Essay

A Survey on Applications of Cloud Computing in Healthcare

... | |Ayesh_15_94@yahoo.com |abc@xyz.com |noorulainkhaan@gmail.com | Abstract – Healthcare Delivery Organizations (HDOs) are facing a number of problems due to their mode of operations. Amongst the problems are improper modes of data storage, insecurity of medical records, difficulty in accessing healthcare services, high cost, and inaccurate diagnosis. Recently research has identified Cloud Computing (CC) as a new and substantial business model capable of providing efficient services that can benefit the healthcare industry. The aim of this paper is to study the existing cloud computing applications in healthcare industry and propose optimal techniques and solution on the basis of analysis. Keywords – Cloud Computing (CC); Healthcare Information Technology (HIT); Healthcare Organizations (HCOs); Cloud Service Models; Cloud Deployment Models; Electronic Health Records (EHR) I. Introduction Improper modes of data storage, insecurity of patient medical records, difficulty in accessing quality healthcare services, high cost of medical services, and inaccurate diagnosis and therapy procedures are amongst the common problems that Healthcare...

Words: 4070 - Pages: 17

Premium Essay

Nt1310 Unit 5 Research

...Section 1.2, are discussed. Research question 01 What are the requirements of secure cloud storage service that allows the file sharing and the violation detection of the security properties? The data sharing increase the complexity of a storage solution, requesting schemes to distribute and manage keys and procedures to granting or revoking permissions. The lazy revocation approach is normally used for efficient purposes but it is not a security recommendation. Data sharing is achieved by the access control mechanisms such as Access Control Lists, Proxy Re-Encryption and Attribute-Based Encryption. Besides, these mechanisms normally depend on a third party that cannot access any sensible information. In this research, ACL was chosen due to the suitability to be used together with monitoring and auditing mechanisms as described in related work. The...

Words: 1285 - Pages: 6

Premium Essay

Hr Strategy

...University of Athens Iera Odos 75, Botanikos, 118 55, Athens, Greece Tel: +30 210 5294757 Email: ivlachos@aua.gr Abstract Although the connection between firm growth and labour is well documented in economics literature, only recently the link between human resources (HR) and firm growth has attracted the interest of researchers. This study aims to assess the extent, if any, to which, specific HR practices may contribute to firm growth. We review a rich literature on the links between firm performance and the following HR practices: (1) job security (2) selective hiring, (3) self-managed teams (4) compensation policy, (5) extensive training, and (6) information sharing. We surveyed HR managers and recorded their perceptions about the links between HR practices and firm growth. Results demonstrated that compensation policy was the strongest predictor of sales growth. Results provide overall support for all HR practices except of job security. Eventually, selecting, training, and rewarding employees as well as giving them the power to decide for the benefit of their firm, contribute significantly to firm growth. Keywords: human resource practices, firm growth, selective hiring, compensation policy Int. Journal of Business Science and Applied Management / Business-and-Management.org 1 INTRODUCTION The extent to which, if any, human resource management (HRM) impacts on organizational performance has emerged as the central research question in the personnel/HRM field (see Becker...

Words: 5061 - Pages: 21

Premium Essay

Cloud Computing

...delivery of computing as a service rather than a product. Resources like software and information are provided to computers and communication devices as a utility like electricity or water. This cloud computing service is done through a computer network, which is the internet typically. Cloud computing is known as encapsulation by some users since the physical location and configuration of how the resources are shared to the devices is often not revealed to the end user. It is like using the electricity. The end user doesn’t have to know the whereabouts of the physical location where the electricity is produced nor how the components are configured from there to their home. They just use the feature or resource instead. Similar to this cloud computing describes the consumption of IT services through the common most computer network available in the world, the internet. Virtualized resources can be shared remotely with ease-of-access exploiting the facilities provided by the internet. The end user must have a tool or an application (Web Browser) installed on their local computers which provides the platform for the sharing of resources. Providers of cloud computing deliver applications or tools via the internet, which are accessed using web browsers and desktop mobile apps, while the main resources (business software and data) are stored in a server located in a remote location. Screen-sharing technology is used sometimes to provide cloud services to the end user, while most...

Words: 2900 - Pages: 12