Information Security

  • 22785 Words
  • 101 Pages
  • Report
Read Complete Research Material

INFORMATION SECURITY

Examining the Challenges to the Efficacy of School Database Security

Abstract

This study will address the issues surrounding data security in the colleges. Some of these issues include the history of database formation, technology implementation, security products, and cost analysis. These issues are addressed in order to assess the current state of data security in colleges and to make recommendations for improvements. As compared to small businesses, higher educational institutions are more vulnerable to these attacks because they may lack the financial resources and expertise to develop a comprehensive information security system. This is because the potential of revenue generation is higher in small businesses rather than higher educational institutions . Lacking principles and methods, an organisation is especially susceptible to attacks from insiders who have direct access to the institutions computer system. The objective of this study is to gather information about the IT-related security issues in educational institutions. The outcome of this study is the results of examination of challenges to the efficacy of school database security.

Table of Contents

Abstract2

Chapter 1: Introduction5

Background6

Problem Statement7

Purpose Statement8

Chapter 2: Literature Review12

Information Security and Database get access to Control18

Securing the Database19

Securing Sensitive Data21

Accesses to the Database22

What Employees Can Do Wrong?27

Customer Service and Business Operations Employees27

Application Systems, Database Administration, Technical Support, and Maintenance27

Recommended Approach: Concentrate Database Access Control at the Source30

Database Security Concepts31

Security Organisation63

Security Management63

Physical Security63

Personnel Security63

Networks and Communication Security Management64

Security and Contingency Management64

Security and Contracting Management64

Chapter 3: Methodology65

Research Method65

Overview of Qualitative and Quantitative Research Approaches65

Overview of the Mixed Method Research Approach67

Research Method and Design Appropriateness67

Benefits and Disadvantages of Mixed Method68

Informed Consent69

Confidentiality69

Validity70

Research Design71

In-Depth Interviews71

Literature Selection Criteria72

Search Technique72

Keywords Used72

Questionnaire73

Reliability78

References80

Appendix86

Chapter 1: Introduction

Global expansion of the Internet, dropping computer prices and a growing list of submissions are convincing enterprises of every size to rely on computers to shop, organise and transmit vital information. This information is still not in consideration of hackers, cyber criminals and insiders who request to steal from or impair an organisation (www.isaca.org). A disgruntled worker, an overzealous competitor, a searching hacker or a cyber robber could all be causes of an attack against an organisation's computerised information. While their motives may alter, persons planning an strike have a wide array of strike options (Weber 2006 74).

Erasing a clientele data groundwork, planting a virulent virus, rifling through correspondence documents, sending a Trojan equine, making a replicate staff records and searching for credit business card numbers are just a couple of the attacks that may be directed at the victim's data expertise (IT) system (Weber 2006 74). The use of IT has become more widespread and today's educational institutions heavily rely on the security of data schemes that it would be impossible to manage without them. The development of e-business and e-commerce submissions also presents abundant possibilities for un-authorised access to the secured information.

Intuitively, little enterprises are more vulnerable to these attacks because they may need the economic resources and know-how to develop a comprehensive information security system. Lacking policies and procedures, an organisation is particularly susceptible to attacks from insiders who have direct access to the ...
Related Ads