Question

In: Computer Science

Analyze the critical components of your information security program as it relates to Hollywood Organic Co-op....

Analyze the critical components of your information security program as it relates to Hollywood Organic Co-op. Justify how the security objectives for the EDMS align with the business objectives.

Identify and describe document access controls and best practices, including:

  • Viewing
  • Editing
  • Copy/paste (including screen capture)
  • Printing
  • Forwarding e-­mail containing secured e­-documents

Identify, define, and describe document access policies and best practices including:

  • Text documents
  • Spreadsheets
  • Financial statements
  • E-mail messages
  • Policy and procedure manuals
  • Research
  • Customer and project data
  • Personnel files
  • Medical records
  • Intranet pages
  • Other sensitive information

Identify, define, and describe all stages of the document life cycle and best practices including:

  • Creation
  • Storage
  • Categorizing
  • Metadata tagging
  • Delivery or sharing
  • Repurposing
  • Review and reporting archiving and/or destruction

Solutions

Expert Solution

Generally the components of information security are

Confedntiality,

Availability,

Authenticatio,Autherization and integrity will be the key concepts of any file.

Security objectives for EDMS aliign with business objectives--

Alligning security objectives with business aspects is becoming a demanding area of any business in the growing threat issues , If we look today the organization like software development companies , data centres , Web services, Analytics , Digital Markeing , Sales Every one's priority at one or other time.

So primarily Allign your security with your profitability

Because Even the comapnies like Apple are facing Security breaches and are getting sued from their own customers you need to get this on your top priority

Assesing the risks

When it comes to assesment many are getting caught up if they scale their security by assesing them correctly we may not get these threats from hackers and our data will not go for sale in dark web

Scale Your Security with your company growth

prioratising the needs will always remains top for company at any stage no matter small or big if you failed here you are out of compeition same goes for security if loose customer belief your good will gets damage and its start for your downfall

Document access controlls

Always use Encryption for the transfer of the files of any format it gives you extra edge of security over senstive data.

Here for the acess controlls like Viewing Editing Copying many Softwares are developed for the Controlling the data at any stage like Technically Maintaining Versions of file which related to senstivity and giving acess and controlling the users with authentications or Prioratizations.

and for transfer in emails or any meansof transferring the files. Encryption is the best method most effective with least cost.

You can control any documents by using data security offerings of the given formats above like text and other documents

For Spreadsheets you can directly control who can view and who can edit as per its acess policies.

Financial statement has autherizations , bankstatements and all the senstive information like the numbers of the product offerings and all.

Policy and procedure mannuals: A policy is a statement that outline all the principals and views of the business the procedure to be followed.

For remaining all the platforms like reaseach papers and medical records the acess policies will be like viewing can be done by all the authorized profesionals and editing will require some authorizations as the senstive informations will always saves a copy more over there will be like verision controll methodology as they can see who edited the file at which stage .

Life stages of the document:

Creation: primary one where it records the creator id,name ,place and evrything which needs and the data will be in a raw format and stored will be like an primary verision

Storage: Storing of the created document will be in different ways as the document senstivity it will be stored in more than one copy in more than one place , for moderately important information will be stored in 3 copies and the storage of the data about the data technically metada will come in next steps.

Categerization: Data will be categerized according to the format and the context of the data and for what it is developed and its dynamic cant say particularly a fixed process for any file according to context and format its mainly decided where it will be placed.

Meta data tagging : the data about data is called meta data and it is linked to the memory location where the data is stored .

Delivery or sharing : delivery and sharing of the data to the particular receiver from the host by means of transfer the data by bits and streams of the data created these will ensure the data what we send will be reach the receiver with less deviation.   

Repurposing : it means the data which is collected and it is used for the comletely different purpose then it is called repurposing it can be done and useful in many ways it the life cycle of the data we created at last the goal of the data created is to be used .

Review and report acheiving or destruction: Reviewing of the data about the data for what it is created for and reporting about it , destruction means its last stage of the life cycle.  


Related Solutions

Managing IT security and risks Information security is critical in the development and implementation of information...
Managing IT security and risks Information security is critical in the development and implementation of information systems in organizations. Assume that you are developing a customer relationship management system for Morita Loan, list five methods that you can use to protect the data in such a system and discuss how you can implement these five means for information security.
Analyze the components and requirements of its information systems technology program.Compliance of health information systems with federal, state, and local laws governing patient information security.
Please answer the following question in 350 words count in your own words with a 3 academic/professional references published in last 5 yrs. Analyze the components and requirements of its information systems technology program.Compliance of health information systems with federal, state, and local laws governing patient information security. Risks of a security breach or failure.
Security and Privacy of Consumer Financial Information as it relates recent news
Security and Privacy of Consumer Financial Information as it relates recent news
Describe with examples, the various layers of security that are critical to your security plan policy.
Describe with examples, the various layers of security that are critical to your security plan policy.
WEEK 1: GOOD COMPONENTS OF A SECURITY POLICY What are good components of an organizational information...
WEEK 1: GOOD COMPONENTS OF A SECURITY POLICY What are good components of an organizational information security policy? What are some areas that you think should be addressed? What are some obstacles that keep organizations from having a well thought-out security policy? How can they be overcome?
The following information relates to the pension plan for the employees of Turner Co.:                            &nbsp
The following information relates to the pension plan for the employees of Turner Co.:                                                                                  1/1/14       12/31/14     12/31/15 Accum. benefit obligation                                                  $6,160,000                                     $6,440,000               $8,400,000 Projected benefit obligation                                                                                                                     6,510,000                                             6,972,000                  9,338,000 Fair value of plan assets                                                                                                                            5,950,000                                             7,280,000                  8,036,000 AOCI – net (gain) or loss                                                                                                                            -0-                                           (1,085,000)                       (1,120,000) Settlement rate (for year)                                                                                                                                                      10%                                                    9% Expected rate of return (for year)                                                                                                                                                            8%                                                     7%...
In a comprehensive fashion, present the various components of the National Social Security Program. Explain the...
In a comprehensive fashion, present the various components of the National Social Security Program. Explain the extent of its coverage and its membership. Explain how it is financed, how it pays benefits to its members. Dscuss its solvency. Provide your recommendations for long-term sustainability.
In terms of Cybersecurity, discuss about your Comprehensive Information Security and Privacy Program (500 Word)
In terms of Cybersecurity, discuss about your Comprehensive Information Security and Privacy Program (500 Word)
Use the Internet or Strayer Library to assess critical components of the Health Information and Technology...
Use the Internet or Strayer Library to assess critical components of the Health Information and Technology for Economic and Clinical Health Act (HITECH Act). Identify how the HITECH Act is a benchmark development in U. S. Healthcare. Use peer-reviewed journal articles to support your response. List peer review articles references or website references used
Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive...
Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. Additionally, there are many security frameworks that organizations commonly reference when developing their security programs. Review the security frameworks provided by NIST (SP 800-53), ISO / IEC 27000 series, and COBIT. Assume that you have been hired as a consultant by a medium-sized insurance organization and have been asked to draft an IT Security Policy Framework. You may create and / or...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT