Practices of privacy and data security and network security


Information Sought: Repeat the Question in this assignment

A: What are the issues & best practices of Privacy and Data Security and Network Security?

The primary issue associated with data security is data loss, especially losses due to malware infections or malicious websites.

For effective privacy, data security, and network security, a cyber action plan is imperative. The action plan should have an inventory of the data, store the data in appropriate locations, develop an effective privacy policy, protect the data from online attacks, and create numerous layers of security (Federal Communications Commission). In addition, the plan should have a fallback plan in case of data theft or loss.

Similarly, network security requires an effective action plan that secures both internal and external networks, establishes strong password policies, develops secure wireless access control, regulates the updates of applications, offers data encryption, and establishes safe web browsing, remote access, and safe external drive use policies.

B: What are the issues & best practices of Website Security and Email?

Website security and email face challenges due to the proliferation of viruses and malware throughout the internet. These issues include malicious attacks, spam, and unauthorized access. The best practice involves an action plan that addresses and plans for the security aspects of web server deployment, implement appropriate security management practices, and ensures all applications meet security requirements through the use of cryptographic and authentication technologies (Federal Communications Commission). Most importantly, an action plan will propose periodical testing of the security of the web server. On the other hand, best practice for email requires setting up of a spam filter, training for responsible email usage, creating strong passwords and studying the proper protection of sensitive information, as well as establishing a sensible email retention policy.

C: What are the issues & best practices for Mobile Devices?

The most significant issues associated with mobile phones include social engineering attacks, resource abuse, data loss, data integrity threats, malware, network and web-based attacks.

The best practice for mobile devices include the use of security apps, regular updates of apps, data encryption, secure passwords, establish reporting procedures for stolen or lost devices, and proper formatting before disposal or transfer of use (Federal Communications Commission).

Exercise Comments (Not Graded): Problem: after reviewing these templates, (Network Disaster Recovery Plan & Voice Communications Disaster Recovery Template) what are the key components, what’s their value, usefulness for the organization?

The key components are the creation of backup policies, tape retention policy, system databases, and off-site storage procedures (Federal Communications Commission). These components are very important to an affected organization, as they determine the extent of loss, both in data and revenues from the loss of data. In addition, they determine the possibilities of recovery and resumption of normal network operations.

References:

Federal Communications Commission. (n.d). Cyber security planning guide. Retrieved 14 October 2014, from www.fcc.gov/cyber/cyberplanner.pdf.

Request for Solution File

Ask an Expert for Answer!!
Other Subject: Practices of privacy and data security and network security
Reference No:- TGS01436903

Expected delivery within 24 Hours