In: Computer Science
IT (Information Technology) Case
ABC uses single sign on (SSO) therefore once the user logs into the network they will have access to all internal systems including ABCR. A user will launch ABCR from the Company’s internal web page and enter the access request. For accessing externally, the user must use an additional two-factor authentication login to access ABCR. Access internally is through the address http://ABC.ABCR.internal.com (or using the internal web home page) and externally through the address http://ABC.ABCR.external.com.
What are the controls and what are the gaps in the study case.
Q) What are the controls and what are the gaps in the study case.
Answer: The company or the ABC is in control of the data provided in which strong security is used. The only gap is its complicated way for registration and is a little bit much hassle.
In Detail: Data security is the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Privacy is an individual’s right or desire to be left alone and or to have the ability to control her own data.
Data security also enables the effective implementation of protective digital privacy measures to prevent unauthorized access to computers, databases and websites. Data security and privacy must be aligned to effectively implement consumer privacy protections.
A reliable electronic system must have adequate security to protect the data the system is entrusted to process and use. Data leaks and security breaches threaten the ability of customers to trust businesses and their products. Flawed or inadequate data security to provide robust data protection puts consumers’ privacy at risk.
The resulting security gap highlights the difference between current and future information security architectures.