During the last five years, the identities of hundreds of thousands of consumers
ID: 3669109 • Letter: D
Question
During the last five years, the identities of hundreds of thousands of consumers were stolen by criminals who were able to access their records in the databases large companies. Thousands of students at some large universities were also were also victimized by identity thieves when succeeded in hacking the student databases at these institutions.
If you were the Database Administrator at a University, what steps would you take to minimize the possibility of students’ personal information being stolen from the university databases? in about
205 words
please elaborate each steps
Explanation / Answer
Appropriate security measures for protecting personal information needed :
Effective ICT security requires protecting both your hardware and software from misuse, interference, loss, unauthorised access, modification and disclosure. However, ICT security measures should also ensure that the hardware, software and personal information stored on it remain accessible and useful to authorised users.ICT security measures help mitigate the risks of internal and external attackers and the damage caused by malicious software such as malware, computer viruses and other harmful programs
Access security and monitoring controls help you protect against internal and external risks by ensuring that personal information is only accessed by authorised persons.
‘Unauthorised access’ is a separate concept from ‘disclosure’, as an entity is not taken to have disclosed personal information under APP 6 (Use and disclosure) where a third party intentionally exploits the entity’s security measures and gains unauthorised access to the information. However, the entity may breach its security obligations under APP 11 if it did not take reasonable steps to protect the personal information from unauthorised access.
Cloud computing can range from data storage to the use of software programs, with data being stored and processed by the cloud service provider.[47] For instance, an entity can store data on remote servers operated by the cloud service provider rather than storing it on their own servers.
If you continue to ‘hold’ personal information when storing or using it in the cloud, reasonable steps may include robust management of the third party storing or handling your clients’ personal information, including effective contractual clauses, verifying security claims of cloud service providers through inspections, and regular reporting and monitoring.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.