Answered You can hire a professional tutor to get the answer.

QUESTION

Provide a 10 pages analysis while answering the following question: CB Hart Law Firm: An Information Security Report. Prepare this assignment according to the guidelines found in the APA Style Guide.

Provide a 10 pages analysis while answering the following question: CB Hart Law Firm: An Information Security Report. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is required. However, the system administration should enhance security and if possible train employees on the data and information handling security procedures to reduce intrusion with or without malice (Keng, 2010, p. 31). In order to cater for the high encryption required in the firm, the firm should include a series of authentication processes depending on the level of information access required by the various users which also depends on their portfolios within the organization. In case of errors, through a process referred to as binding, the user will get the program results designed for the required purpose, this will help to reduce chances of making mistakes being that database contains very crucial information that should objectively guide the user (Zhou, 2005, p. 101). The report is to establish security of information within the CB Hart Law Firm. The Law firm should also identify the problems encountered by users in all departments and branches so that a comprehensive training may be carried out to ensure that they are at par with the required information security regulations. This would reduce chances of compromising information security as However, the integration of Visual basic and structured programming language library, the OLE which is used as a link the user application to the Oracle database. Background information (Present current statistics, facts on information) There are series of both internal and external threats that the company faces in the quest to intensify the organization’s security. Despite the different categories of threats available, there are some situations that would partially compromise the information integrity while other security threats would fully compromise the firm’s information systems (Layton, 2006, p. 16). The change in technology necessitates a series of actions and security provisions to enhance data integrity, through storing information on a computer in an electronic form accessed. For there to be a properly organized system, that achieves the set objectives of the organization, which is the core secret bonding the survival in the business world. Data and information security is very crucial and should be handled through authentication techniques accessed by delegated individuals to handle and manage the confidential information that the survival of the organization depends on (Reeves, 2006, p. 23,). However, this can be done with the aid of a system structured to procedurally collect information (data) stored a s a soft copy within a computer system, database is able to store both large and small information/ records which should be easily accessible with options of adding or removing the information content (Peltier, 2005, P. 107). Only the authorized personnel with the authentication code should do this. For information and database efficiency, the Law Firm need to put in place A DBMS, this is a database management system with ability to manage all the information and queries when in cooperated in the system. However, through both intranet and internet connectivity’s, the Database could be accessed from multipoint within the organization despite t he distance between the branches of the organization.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question