Select Page

San Jose State University Access Control Data Security Breach Essay

Question Description

A:

A data security breach results in compromise and exposure of sensitive information due to unauthorized access to available networks, devices, data, and applications. In the case study involving Education Review, files of about 100,000 students were exposed through its website. However, the officials could have implemented effective security controls to prevent the incident. For instance, the company would have secured its computer and related devices using anti-malware and antivirus software (Joshi & Singh, 2017). In such a case, it would be possible to detect and address any form of malicious attacks. Kaspersky antivirus is one of the ideal choices for keeping the computers free from any form of infection and preventing hackers from taking fold of the system.

Besides, the education service would have backed up student’s files on a removable drive. In most instances, data breaches result in files encryption and a demand to ensure that they are available to the users. If the company had a separate backup, sensitive data would be safe in a data breach incident. Alternatively, the company would utilize strong passwords to prevent unauthorized access to information (Joshi & Singh, 2017). The password ought to combine lower letters, upper case letters, symbols, and numbers. In such a case, the hackers would find it difficult to crack such passwords than simpler ones. Importantly, the company should change the password regularly to minimize the risks of unannounced data breaches.

Furthermore, the education service would use Endpoint Detection and Response (EDR) to prevent possible security breaches. Artificial intelligence is an effective mechanism to stop advanced threats and malware, especially on vulnerable points. According to research findings, patch and vulnerability management can be equally effective strategies to prevent security breaches. According to Anderson, Baskerville, & Kaul (2017), the best strategy to facilitate effective patch management is outsourcing related companies. However, education officials ought to have a comprehensive understanding of effective ways of preventing security breaches to protect sensitive information.

————–.(Minimum 160 words) + 1 reference APA format

B:

A security breach is a process by which unauthorized users gain access to the information stored on an organization’s network. The number of security breaches and the nature of the information breach varies. In general, the more sensitive information, the greater the risk to the organization. However, there is a slight variation in risk as information can be accessed by a lower-level employee, an in-house employee or a contractor with some control over the network. There are some possible controls to avoid an enterprise security breach. One way to avoid an enterprise security breach is to implement a robust password management system. These are the ways to prevent an enterprise security breach. Avoid using software on the network that contains sensitive information. Implement robust password authentication mechanisms for users and disable unused accounts (Chapple et al., 2014).

Security breaches of educational institutions are among the greatest threats to any educational institution’s continued operation and students. Those students must be protected in this regard and have the same protection level as other students attend the same college or university. Most often, a campus security breach results from the misappropriation of resources, the misuse of a computer system, or the misapplication of an electronic system. A user who attempts to access confidential or restricted information on a system without appropriate authorization will be terminated with immediate access privileges, which may include the ability to change system settings. It is similar to how a user sends files from one computer to another over a network. The most critical design decision that can make is not to have a single point of failure or, if it is a critical system, to protect multiple points of failure by using redundant access control to prevent a single point of failure from compromising the system. For example, if every employee of an organization has access to a single network and their company files, then the cost of a single loss would be enormous at one of those points of the network (Jeong et al., 2019)

————–.(Minimum 160 words) + 1 reference APA format

Note:

Must be entirely focused on the specific content.

Add some generic points that could apply

Please check plagiarism, Grammarly

Reference Books :

1.Chapple, Mike, Ballad, Bill, Ballad, Tricia, and Banks, Erin K. Access Control, Authentication, and Public Key Infrastructure, Second Edition. Jones & Bartlett Learning, 2016, ISBN: 978-1-284-03159-1

2.Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.

"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you "A" results."

Order Solution Now