Please use this identifier to cite or link to this item:
Evaluation of Data Security Methods
|Title:||Evaluation of Data Security Methods|
|Authors:||Mase, Danny A.|
|Date Issued:||Nov 2021|
|Publisher:||University of Hawaiʻi — West Oʻahu|
|Abstract:||We are living in an age of data where the information stored on computerized systems is our most valuable asset. This study emphasizes the importance of applicable regulations, standards, and frameworks that impact organizational security posture and related domains. It also provides a primer on basic data security themes to inform readers of the ever-changing IT threat landscape, the current state of security regarding data and technology, and the ongoing cybersecurity efforts in information security management. |
In an effort to develop strong cyber resilience, the primary objective of this study is to identify and evaluate best practice for the security of data stored on information systems. The Evaluation of Data Security Methods project will identify the top three most effective threats and vulnerabilities to information systems and information systems security, to provide the building blocks required for a comprehensive, quantifiable assessment into increasing organizational security posture and reducing security risks.
|Description:||A student presentation to the Fall 2021 Student Research and Creative Works Symposium|
|Rights:||Attribution-NonCommercial-NoDerivs 3.0 United States|
|Appears in Collections:||
Student Research Symposium|
Please email email@example.com if you need this content in ADA-compliant format.
This item is licensed under a Creative Commons License