case2.docx

1

6

Matthew Pankey

Cybersecurity in Data Management at Workplace: Draft

With the ubiquitous and pervasive application of information technology in business organizations' environments, a significant and sensitive amount of data is generated and stored on cloud computing platforms, creating substantial Cybersecurity threats and vulnerabilities Garraghan et al. 2018). In the workforce environment, some fundamental duties and responsibilities involve customers' data management, calling for effective IT-based Cybersecurity customers. Cybersecurity in a workplace occurred in a twofold dimension including the growing data sophistication and data security and privacy compromise due to Cyberattacks and Cybersecurity issues. In the data management role and data manager, collecting and securing data is prone to data breaches and cyber-attackers aging access to sensitive data. Admittedly, Cybersecurity is a fundamental IT-based challenge facing employees, organizations, and stakeholders that require an effective platform for data security and privacy concerns. Thus, Cybersecurity in Data Management at Workplace resonates with fundamental articulation on IT-based challenges in the management information system. Therefore, addressing the topic in detail will offer effective recognition of the IT-based challenges and pragmatic solutions to ensure a secured data management system. Suggesting fundamental Cybersecurity measures to counteract customer data leakage experience is fundamental.

Solutions

Notably, the business case experiences require practical approaches to ensure data privacy and security, limiting possibilities of other customers' sensitive data leakage to unauthorized individuals. Notably, a robust access control, compliance by third-party vendors, employee data security and awareness training, and developing an effective data breach responses plan demonstrate real-time solutions to data breaches in any organization. According to the authors, Data Leakage Protection Based on Context provides an effective platform for data breach and leakage management within an organization, ensuring robust security and privacy concerns (Yu et al. 2018). Similarly, in this analysis of the business, there is an acknowledgment of Data Leakage Protection Based on Context strategy to accommodate access control, compliance by third-party vendors, employee data security and awareness training, and developing an effective data breach responses plan. Thus, a comprehensive explanation of each suggestion to counteract data leakage experience within a workforce, exposing customers' sensitive data to unauthorized personnel is necessary for data security models' decision-making.

Access control

Access control accommodates several models that provide a restrictive platform to ensure that only authorized individuals within an organization have access to sensitive data. Notably, mandatory access control, directory, rule-based, role-based, risk-related, and attribute-based access control models are effective for the security of data. For example, the rule-based access control model offers significant security rules for securing administrator systems. Specifically, access control strategies such as user authentication, verification and identification, password, data encryption and decryption techniques, cryptographic analytics among other access control measures provide an effective platform to restrict unauthorized individuals for effective decision-making.

Similarly, the business case whereby there is a significant Cybersecurity breach, causing customers' sensitive information leakage to unauthorized individuals requires effective articulation on access control strategies user authentication, verification and identification, password, data encryption and decryption techniques, cryptographic analytics for internal and external customers data security in the workplace environment. According to the researchers, effective access control and Cybersecurity policies within domains such as healthcare, finance, education, aviation, and commerce have been effective, embracing robust information management system architecture, accommodating information under control, and significant Cybersecurity requirements within an organization (Mishra et al. 2022). Similarly, the business case, via Data Leakage Protection, Based on Context should accommodate Cybersecurity policies and requirements such as data security, privacy, confidentiality, integrity, and availability to create a secured security infrastructure. Additionally, fundamental access control practices such as user authentication, verification, and identification, password, data encryption, decryption techniques, cryptographic analytics among other access control measures need fundamental applications to ensure internal and external data privacy and security in an organization.

Compliance by Third-Party Vendors

Importantly third-party compliance is a fundamental suggestion for an organization that deals with sensitive data on a cloud computing platform that supports information security. Notably, a business organization that offers regulated data or access to IT systems that contains sensitive data requires fundamental articulation to third-party compliance obligations and requirements. Third-party Compliance requirements accommodate IM and presence services components, compliance server, and support clients that are fundamental for information security from Third-party organizations, accessing sensitive data or IT Systems for business organizations. Specifically, embracing vital steps such as the risk evaluation process, in identifying, segmenting, mitigating, risk, and risk factors for effective third-party preparedness is effective. Similarly, due diligence proportion of risks involving data breaches is effective in third-party compliance requirements. According to the authors, accommodating Cyber Third-Party Risk Management is effective for robust data security within an organization, embracing Company-wide approach strategies for the entire information security coverage (Keskin, et al. 2021). Fundamentally, creating an effective platform for information security through a comprehensive workflow system and a Company-wide approach for risk management is an effective obligation for third-party vendors' consideration. Similarly, the business case should accommodate fundamental considerations to ensure that third-party vendors with authority to access significant and sensitive data meet all the third-party compliance obligations.

Employee data security and awareness training

In the business case, Cybersecurity is a fundamental IT-based challenge facing employees, organizations, and stakeholders that require an effective platform for data security and privacy concerns. Specifically, offering extensive and comprehensive employee training on Cybersecurity and awareness is fundamental in managing internal threats and vulnerabilities of data security. According to the authors, training and creating awareness on information security awareness, accommodating current model and content provides an effective platform for information security, managing internal threats and vulnerabilities to information (Khando et al. 2021). Similarly, the business case on customers' data breach and leakage due to employees lacking awareness and knowledge on data security and privacy require fundamental articulation on information security wares, embracing modern and real-time methods towards effective data management. Notably, training on phishing attacks, password and authentication, physical security, mobile device security, working remotely, public Wi-Fi and Cloud security are underpinning. Importantly, the business organization case requires fundamental employee training and awareness on an information security system for a robust solution on data leakage cases. Thus, employee training and awareness on information security offers knowledge and concepts in preventing data breaches and customers' data leakage in an organization setting.

References

Garraghan, P, Yang, R, Wen, Z., Romanovsky, A., and Xu, J. (2018) Emergent Failures: Rethinking Cloud Reliability at Scale. IEEE Cloud Computing, 5 (5). pp. 12-21.

Khando, K., Gao, S., Islam, S., and Salman, A. (2021). Enhancing employee’s information security awareness in private and public organizations: A systematic literature review. Computer & Security. DOI: 10.1016/j.cose.2021.102267

Keskin, O., Caramancion, K., Tatar, I., Raza, O., and Tatar, U. (2021). Cyber Third-Party Risk Management: A Comparison of Non-Intrusive Risk Scoring Reports, Electronics 2021, 10, 1168. https://doi.org/10.3390/electronics10101168

Mishra, A., Alzoubi, Y., Gill, A., and Anwar, M. (2022). Cybersecurity Enterprises Policies: A Comparative Study. Sensors, 22, 538.

Yu, X., Tian, Z., Qiu, J., and Jiang, J. (2018). A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices. Hindawi Wireless Communications and Mobile Computing. https://doi.org/10.1155/2018/5823439