ipl-logo

Information Security Analysis Paper

907 Words4 Pages

Introduction
Data is one of the most important sources of an organization. A relevant framework such as information security system is an integral part of the business processes of each organization. Information Security Management demonstrates itself as one of the key functions to ensure the security of an organization and the ability to operate organizational goals, not just IT resources. As businesses are facing various complexities, weaknesses and uncertain risks from a wide variety of violence. It depends on how this circumstance is dealt with, it can turn into a risk or chance to dissolve or improve business esteem. Thus, Security becomes a major part of daily living, therefore, an organization must guarantee that they are sufficiently …show more content…

The CNSS Model is composed of three dimensions. The first dimension is confidentiality, integrity, and availability; the second dimension is processing, storage, and transmission; and a third dimension is policy and procedures, technology and education training, and awareness (Aplontech, n.d.). CNSS Model analysis is focused on Hyatt Furniture Inc. who has been operating since 2011 in Los Angeles California. Hyatt Furniture Inc. is one of the leading manufacturers and suppliers of the influence of a Spanish steel iron and steel designs such as stainless steel beds, sofas, tables, dining sets, seats, arch in the garden, lamps, chandeliers, topiary, and so …show more content…

Only authorized personnel or employees of Hyatt can process and access the files. Hyatt is using an email policy that ensures the proper usage and address of the company name Education The IT dept. of the company are trained how to manipulate the database. The sales dept. of the company are trained how to boost the marketing of the company with such legal aspects. Employees are trained on the risks that can be obtained from sharing resources from an unauthorized person. Technology The data of Hyatt especially their customer's personal details, as well as their financial statements, are stored in their database system and can be accessible for few authorize users. The company is using a separate sales and inventory system to manage the sales appropriately. The company is using a designate email server. Therefore, the email activities of the employees are tracked. Integrity Policy The company should monitor the logging history of each employee. The company is using a digital signature acceptance policy which signatures are validated. The company provides a remote access policy to the authorized

Open Document