Individual Task – Chapter Summary – Week 7

subject Type Homework Help
subject Pages 2
subject Words 1264
subject School GADJAH MADA UNIVERSITY
subject Course AIS

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
CHAPTER 9
Organization possession like business plans, trade secrets, expense data, etc, provide many
classified records. Conserving the intellectual property confidentiality of the company and related
knowledge exchanged by its collaborators has long been regarded as a fundamental goal of
information security. The first step in protecting intellectual property confidentiality and other
important financial records is to determine the information location and who can handle that. The next
move is to identify the information with regard to its importance for the company, until the
information that requires protection has been found. The required control set may be implemented to
secure the data until the information is secured. Encryption is a very important and efficient secrecy
protection technique. Only through this, data will be protected across the Internet in transit. In order to
encrypt information stored on websites or in a public cloud, it is also an essential aspect of defence in
data. However, encryption does not secure information during processing until it is saved or
distributed, so it must be decrypted in order to be processed.
The Information rights management (IRM) software offers better security for classified
information contained in a digital format, which gives us the ability not only to restrict access to
special files or records but also to define actions that may be taken by persons with access to such
data. Confidentiality protection often calls for controlling outbound messages. Another platform that
functions like anti-virus systems but in reverse is the Data Loss Prevention (DLP) app. The inbuilding
coding known as a digital watermark can and should be added to papers. The digital watermark takes
the role as a detective control, which allows a company to recognize sensitive details. Training is also
the most critical safeguard for privacy. Employees must know which information they should
communicate with external parties and which information they have to secure. The theory of privacy
is similarly linked to the concept of secrecy. To safeguard privacy, companies can run masking data
page-pf2

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.