This website uses cookies to ensure you have the best experience. Learn more

Security Notes Essay

1168 words - 5 pages

Week 1: Lecture 1: Information

* Information
* Information is things that are or can be known about a topic. It is also known as communicable knowledge, which is something you can impart to someone else. It is an unambiguous abstraction of data. Now in the digital sense, the smallest unit of information is a single bit; is the bit on or is the bit off? Now if we go back to the days of landline telephone service, you would call information which would give you a phone number for a subscriber if you describe enough detail who the describer might be. The difference between data and information is that information is knowledge that you get or abstract through processing of data. ...view middle of the document...

* Financial result- you do not like or want financial results to leak prematurely. You also do not want competitors to know that you are doing worse than they are or that they are doing better than you.
* Personnel Data- It wouldn’t be good if it got out that an employee was out on sick leave because they had a mental breakdown
* Salary data is another thing that we would not wan to leak. There is no better way to discourage employees then for them to be able to tell who makes what.
* Healthcare information, if this was leaked people would be able to see who has what health care policy, who met their deductable, who is seeing which doctor and so on.
* Information Classification
* Why do we have to categorize information or classifying information? Well, because different information needs different protection. It is also very hard to protect everything with the same level of protection. If someone did that, it would be very expensive. So, there are different categories of information that require different protections.
* Merger and acquisition information (who is buying out who)
* Proprietary Information
* Executive private information (who is getting a bonus)
* Personnel Information (hiring and firing)
* Health care information (who is pregnant who is not)
* Characterization of Classified Information
* Classified information is a categorization applied to information that a government claims is sensitive information. Which means that the government restricts it by law to a group of people or groups of people and you have to be cleared for that information with a formal security clearance. A formal security clearance is often required to handle classified documents or access to classified data. Now the purpose of classification is to protect information that can be used to endanger or damage national security.
* For example, releasing the plans for an atomic bomb
* Classification defines a state secret and gives you a level of protection that is based on the expected damage that the information could cause in the wrong hands.
* For example, if a spy is outed in a foreign country that could cause harm.
* Government classification
* Top-Secret
* Can cause grave national damage. This is the highest level of classification.
* Secret
* Would cause serious damage
* Confidential
* Would cause damage or prejudicial
* “wiki leaks” scandal
* Restricted
* Would cause undesirable effects.
* Implication and Sample Classifications
* Implication
* The implications of classification...

Other Papers Like Security Notes

Apush Essay

412 words - 2 pages APUSH Cold War Lecture Notes Define Cold War- • An era of distrust, threat of nuclear war. & ideological expansion between the superpowers, USA & USSR. What change occurred with Stalin between the Yalta and Potsdam Conferences? • He agreed to allow self determination in Eastern Europe, He extended his control over eastern Europe to create a buffer zone between USSR and its future enemies. What major

Financial Statement Analysis

2535 words - 11 pages XYZ CONSTRUCTION CO., INC. FINANCIAL STATEMENTS DECEMBER 31,20X1 SAMPLE FINANCIAL STATEMENTS Page 2 Balance Sheet Page 3 Statement of Income and Retained Earnings Page 4 Statement of Cash Flows Pages 5 - 6 Notes to Financial Statements Pages 7 - 13 ACCOUNTANTS' REVIEW REPORT FINANCIAL STATEMENTS SUPPLEMENTAL INFORMATION Schedules of Earnings from Contracts and Contract Costs Page 14

Capstone Project

2146 words - 9 pages have one.   * Updates: All the Windows 7 Professional systems are up-to-date because they were automatically checking and downloading updates. However, several installations of Microsoft Office need updating. Passwords: A random sampling found that most people aren’t using passwords at all or had them written on Post-it notes. In particular, none of the laptop computers are password protected.   * Physical security: We had the insurance


1448 words - 6 pages their own data breach, when they had back up computer tapes that were being transported to another location stolen from one of its contractors in Virginia. The tapes contained names, Social Security numbers, home addresses and, in some cases, clinical notes and lab test results for nearly 5 million patients, making it the largest medical data breach since the Department of Health and Human Services began tracking incidents (UNGERLEIDER, 2012

Disaster Recovery Management Com-540-Mbol1

2456 words - 10 pages responsibilities under the Federal Information Security Management Act of 2002 (FISMA) to develop mandatory standards and guidelines for federal agencies information and information systems.” (NIST Role, 2014) NIST produces standards documents which are referred to as ‘special publications’ or ‘SP’. NIST notes “Special Publications in the 800 series (established in 1990) are of general interest to the computer security community. This series reports on

Information Flow And Use

685 words - 3 pages everything down with pen and paper! Once distributed further down the line and almost memorized. The notes are then ripped up and burned, so there is no saving data or, a file like you would on a computer. Another way the flow of information is performed and distributed. It is still verbally given, but to mass amounts of people at once by an individual. A person of high rank will have up to hundreds of soldiers gather around him at once, as he puts

Confidentiality And Alton Logan

1005 words - 5 pages begins the case with Mr. Alton Logan. In 1982, Alton Logan was convicted of killing a security guard at a Chicago-area McDonalds. Even though the testimony that Logan was at home when the murder happened, the jury still found him guilty of first degree murder And to top it off, the two attorneys, Dale Coventry and Jamie Kunz, knew Logan was innocent. And how did this knowledge come about? Andrew Wilson, the attorneys’ client, admitted to the murder

Illegal Immigration

2200 words - 9 pages Description Amount (in millions) General Expenditures $8,184 Education $2,108 Administration of Justice $7,830 Food Assistance $3,295 Public Housing $787 Public Assistance $4,082 Medicaid Insurance $5,700 Emergency Medical Care $250 Supplement Security Income (SSI) $2,910 Unemployment Benefits $38 Total of Benefits $35,184 Note: from the Federation for American Immigration Reform (FAIR

Finance Hw Week 1

1600 words - 7 pages equity increases, as an increase in WACC notes a decrease in valuation and a higher risk. h. How do free cash flows and the weighted average cost of capital interact to determine a firm’s value? A firm value is the sum of future expected free cash flows converted into today's dollars. i.Who are the providers (savers) and users (borrowers) of capital? How is capital transferred between

Pharmacy Technician

460 words - 2 pages a part of pharmacy team The role of pharmacist and pharmacy technicians are similar in many ways. David Hill, chair of the task force of (CPhA), notes that pharmacist and pharmacy technicians face the greatest challenge in meeting the goals of the Blue print that, it is the Profession’s responsibility to protect the safety, security, and integrity of the drug distribution. On July1,2011, Pharmacy technician become a regulated

File Retention

537 words - 3 pages Employee Files and Retention In Human Resources the managers must make sure the files are maintained properly, stored properly, and the documents are filed in the appropriate files within the company. There are state laws that have to be followed. When determining where to place a document, the HR department has to consider what information the document contains. Personnel files cannot have documentation with medical, social security numbers or

Related Essays

Cascade Company Essay

576 words - 3 pages security. The second condition states that the security is sold after the company has already collected at least 85 percent of the principal at acquisition. ( Disclosures for Held to Maturity Securities While sales and transfers of held to maturity securities should be rare, these actions should be disclosed in financial statements. The information that should be disclosed in the notes of these financial statements and should include the

Resturcturing Debt Data Essay

965 words - 4 pages Warfield, 2007). The information included in the loan covenant is the amount authorized to be issued, interest rate, due dates, call provisions, property pledged as security, sinking fund requirements, working capital, or any other restrictions. All of this information should be included in the body of the financial statements or the notes for a complete understanding of the financial position of the company (Kieso, et al., 2007). Bonds Payable

Linux Security Technologies Essay

919 words - 4 pages . Notes 1. Mark G. Sobell, A Practical Guide to Fedora and Red Hat Enterprise Linux Ann Arbor, Michigan: Edward Brothers, 2010, 414-415. 2. National Security Agency, Security - Enhanced Linux, 15 January 2009. (9 April 12). 3. Sobell, A Practical Guide to Fedora and Red Hat Enterprise Linux, 414. 4. Sobell, A Practical Guide to Fedora and Red Hat Enterprise Linux, 414. 5. Wikipedia, chroot, June

Social Security And Medicare Essay

2550 words - 11 pages necessary improvements to Social Security and Medicare, need to work together to ensure a brighter outlook for future generations. Resources: Facts from EBRI-the basics of Medicare: updated with the 2008 Board of Trustees Report. (2008). EBRI Notes, 29(5), 13-18. Goss, S. C. (2010). THE FUTURE FINANCIAL STATUS OF THE SOCIAL SECURITY PROGRAM. Social Security Bulletin, 70(3), 111-125. Quadagno, Jill, (2008). Aging and the Life Course New