Thursday, May 2, 2019

Wa#2 Assignment Example | Topics and Well Written Essays - 500 words

Wa2 - subsidisation ExampleAn example is an employee who gets devil to several reports on salaries and decides to compute the individual salaries of some employees. She is allowed to access separately report individually, but she does not have permission to hit the sack individual salaries. In other words, not properly understanding the implications of access to several data all at once mickle pass away to semantic security breaches.2. Reporting systems increase the risks of semantic security breaches because they give access to several reports simultaneously for reporting needs. Reporting systems do not realize that giving a bulk of information to peerless employee drive out result to the latter using them to deduce certain information that they are not allowed to know or access. These systems are important to getting work d unrivalled, but they can offer access to as well much information that can result to semantic security breaches. These systems unintentionally offer inf ormation that one individual should not have, provided that the person does some deduction that can result to logical assumptions.3. An organization can protect itself from accidental losses due to semantic security problems by ensuring that no one person can get access to several data systems or data that can result to semantic security breaches. At the same time, it can hire one people to do one start up of the job and not all of the activities of the job, so each person can have limited permissions to access data. Furthermore, it can create clear policies about permissions and data restrictions and penalties for transgressions. These transgressions can prevent employees from conducting data triangulation. Moreover, it can also ensure that the organization has records of the data access it gives to different employees, so that if semantic security breaches happen, they can specialise who accessed what. At the same time, the organization can purchase insurance on its semantic s ecurity, so that it can have access to

No comments:

Post a Comment