Data security in organizations
- Details
- Hits: 14437
The author is associated with orderwriters.com which is a global custom writing company. If you would like help in custom writing or term paper writing, research paper and essays, you can visit orderwriters.com.
Data security in organizations
Thesis statement
“Client’s data security is paramount in any successful organization.”
Introduction
Confidentiality, integrity and ability to access information by a client are crucial for an organization. Any client would not feel secure if they knew that their information is not treated confidentially, especially financial details. When a client’s financial data is at risk, then the client is likely to lose trust with the organization and this may jeopardize the survival of the organization. Confidentiality, integrity and availability of information are the main security risks within an organization. In this paper, therefore, I am going to look at risk management practices to mitigate security breaches within an organization.
Guarding against security breaches
The availability of wireless networks to anyone within the range makes them more risky in terms of data security. Weiss (2002) says that eavesdropping is a common breach to wireless networks. To mitigate this, he suggests that encryption be used, which can be done by introducing a shared key, a key generated from a static key, a dynamically generated key or negotiated keys (ibid).
Authentication is also another problem that has to be dealt with in regards to wireless networks. Access is available to many users in a wireless network hence making it difficult to verify where traffic is coming from (Weiss, 2002). Therefore, it is advisable to allow users to identify themselves before they can access the network (Ibid). This will help in tracking usage of the network and minimize risks associated with the ease of access availed by wireless networks.
Organizations need to invest in wireless security to mitigate dangers caused by breaches within wireless networks. Weiss identifies cost as the main problem of security for wireless networks. Appropriate equipment for security and hiring someone to secure the network and maintain security have to be put into consideration when dealing with the problem of wireless networks security (Weiss, 2002). The organization must therefore consider investing in powerful security equipment for the sake of their clients. Maintaining trust with one’s clients cannot be easily regarded. It is the key to the survival of an organization.
Guarding against internal breaches
Kilpatrick (2008) is of the suggestion that firewall should be used to guard against unauthorized access to data especially over the internet. Firewalls are designed to prevent access to or from a private computer by unauthorized people (Kilpatrick, 2008). Firewalls help protect against unauthorized access as well as malicious users and incidents from outside the network.
Proper encryption codes have to be used in order to prevent attacks from within. Keys must only be availed to authorized personnel to prevent security breaches that are so common in many organizations. Traffic tracking is necessary in order to establish the source as well as users of data within an organization. This is because if users of information are well tracked, it will be easy to identify any security breach. This therefore means investing in personnel to monitor network usage within the organization. Access should be limited to only authorized personnel (Weiss 2002).
Conclusion
There is nothing as more important as ensuring client’s trust is maintained. An organization’s survival is mainly determined by the confidence clients have in it. If this trust is eroded, the damage to an organization can be irreparable. For this reason, any organization worth its reputation must invest in the security of the client’s information.
References
Kilpatrick, I (2008) What’s a firewall to do? Six defenses beyond the perimeter. retrieved June 3rd, 2014. http://www.checkpoint.com/securitycafe/readingroom/perimeter/defense_beyond_perimeter.html
Weiss, J (2002) Wireless networks: security problems and solutions. Retrieved 3rd June, 2014 http://www.sans.org/reading-room/whitepapers/wireless/wireless-networks-security-problems-solutions-172.