Wednesday, November 20, 2019

Wa#2 Assignment Example | Topics and Well Written Essays - 500 words

Wa#2 - Assignment Example An example is an employee who gets access to several reports on salaries and decides to compute the individual salaries of some employees. She is allowed to access each report individually, but she does not have permission to know individual salaries. In other words, not properly understanding the implications of access to several data all at once can lead to semantic security breaches. 2. Reporting systems increase the risks of semantic security breaches because they give access to several reports simultaneously for reporting needs. Reporting systems do not realize that giving a bulk of information to one employee can result to the latter using them to deduce certain information that they are not allowed to know or access. These systems are important to getting work done, but they can offer access to too much information that can result to semantic security breaches. These systems unintentionally offer information that one person should not have, provided that the person does some deduction that can result to logical assumptions. 3. An organization can protect itself from accidental losses due to semantic security problems by ensuring that no one person can get access to several data systems or data that can result to semantic security breaches. At the same time, it can hire one people to do one part of the job and not all of the activities of the job, so each person can have limited permissions to access data. Furthermore, it can create clear policies about permissions and data restrictions and penalties for transgressions. These transgressions can prevent employees from conducting data triangulation. Moreover, it can also ensure that the organization has records of the data access it gives to different employees, so that if semantic security breaches happen, they can determine who accessed what. At the same time, the organization can purchase insurance on its semantic security, so that it can have access to

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.