Evaluation of Data Security Methods
Date
2021-11
Authors
Contributor
Advisor
Department
Instructor
Depositor
Speaker
Researcher
Consultant
Interviewer
Narrator
Transcriber
Annotator
Journal Title
Journal ISSN
Volume Title
Publisher
University of Hawaiʻi — West Oʻahu
Volume
Number/Issue
Starting Page
Ending Page
Alternative Title
Abstract
We are living in an age of data where the information stored on computerized systems is our most valuable asset. This study emphasizes the importance of applicable regulations, standards, and frameworks that impact organizational security posture and related domains. It also provides a primer on basic data security themes to inform readers of the ever-changing IT threat landscape, the current state of security regarding data and technology, and the ongoing cybersecurity efforts in information security management.
In an effort to develop strong cyber resilience, the primary objective of this study is to identify and evaluate best practice for the security of data stored on information systems. The Evaluation of Data Security Methods project will identify the top three most effective threats and vulnerabilities to information systems and information systems security, to provide the building blocks required for a comprehensive, quantifiable assessment into increasing organizational security posture and reducing security risks.
In an effort to develop strong cyber resilience, the primary objective of this study is to identify and evaluate best practice for the security of data stored on information systems. The Evaluation of Data Security Methods project will identify the top three most effective threats and vulnerabilities to information systems and information systems security, to provide the building blocks required for a comprehensive, quantifiable assessment into increasing organizational security posture and reducing security risks.
Description
A student presentation to the Fall 2021 Student Research and Creative Works Symposium
Keywords
Citation
Extent
1 page
Format
Geographic Location
Time Period
Related To
Related To (URI)
Table of Contents
Rights
Attribution-NonCommercial-NoDerivs 3.0 United States
Rights Holder
Local Contexts
Collections
Email libraryada-l@lists.hawaii.edu if you need this content in ADA-compliant format.