StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Firewalls and the California Law on Security Breach - Research Paper Example

Cite this document
Summary
The objects of analysis for the purpose of this paper "Firewalls and the California Law on Security Breach" are firewalls that can be defined as a security system that is used to control access in a company-protected area within the corporate network…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful
Firewalls and the California Law on Security Breach
Read Text Preview

Extract of sample "Firewalls and the California Law on Security Breach"

According to Stephen and Michael (2009) firewalls can be implemented both in software and hardware. The common types of firewalls include packet filter, application gateway, circuit-level, and Proxy server. The firewall is placed between the computer and the internet to prevent intruders.

In choosing the firewall to use, there are important issues Bibliofind needed to consider and they include:-Application protection, stealth mode, inbound and outbound filter. Outbound and inbound filter information when they pass through the system, only important information will be allowed to pass while discarding the rest based on the rules which have been created by the Bibliofind Company. This is the primary function of firewalls. Bibliofind ought to have paid attention to this kind of information in order to protect its server from intruders.

Bibliofind should use Stealth mode because it is one of the vital elements or rules to be considered while installing its firewalls as it helps not to block but to make your computer appear as if it does not exist. Due to this, intruders and hackers will be made to think that you are not connected or you are offline.

The use of Intrusion detection is also one of the best ways Bibliofind ought to have used since hackers usually use very many ways to penetrate the security system. Scan for intrusion detection is important and it would have helped Bibliofind to notify the presence of such intruders and Biblofind could have been safe from these hackers.

Q3

Personal information can be defined as; or to include individual name, personal, social status, and any other information which might be of any security concern. When this bill was passed in the state of California, many people supported it while others decline to support it. The argument against this bill is that it might make consumers believe that data breach could lead to stealing of identity and this could lead to the increase of the cost of running the business without benefiting consumers or business people. In examining both social corporate responsibility of any business (Kathryn 2002) argued that it could not fit and the time for presenting the argument in court could be wasting precious time. Besides, the law itself also lacks vital information like the time of the breach or the kind of information that might have been breached.

The law also can be argued in support of it that it will be an eye-opener to the consumer; the consumers will understand well the essence of security for private information and also to protect themselves from identity theft, it could also dispel the uncertainty around security breach and a good step taken in solving one having his or her information breached. The law could make modest and helpful steps in current security breach notification and help in reducing cybercrimes in the whole world if not only the state of California.

Regarding the enacting of this law, (Stephen et al.) argued that if this law is not brought to force, security breaches will go on until that point business society will find the investment needed to implement the security system in the company being more than the cost of investment. It is good that this law comes at the right time to help to solve this problem. It is high time both the government and private investors shift cost-benefit analysis to upgrade a better security system. Good care and standards must be maintained to govern the implementation of this law and the security situation as a whole.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Bibliofind Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Bibliofind Research Paper Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/e-commerce/1593758-bibliofind
(Bibliofind Research Paper Example | Topics and Well Written Essays - 500 Words)
Bibliofind Research Paper Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/e-commerce/1593758-bibliofind.
“Bibliofind Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/e-commerce/1593758-bibliofind.
  • Cited: 0 times

CHECK THESE SAMPLES OF Firewalls and the California Law on Security Breach

The Evolution of the Wireless Phone Network

This paper  ''The Evolution of the Wireless Phone Network'' discusses that the wireless phone network is gaining ground owing to its reduced cost, as well as ease-of-use.... The cost of communication will be eased, and hence communication will be enhanced.... nbsp;   … It is doing this by introducing a physical realism into the world of electronic communication, as well as goods, and services (Lee, 2001)....
10 Pages (2500 words) Literature review

Cyber Crime as opposed to Cyber warfare

Thus, it is stated here that the emergence of hackers and criminals that develop viruses and malware has jeopardized the security of public and private business information and records in an organization.... Problem Statement Although systems and software developing IT organisations (such as Microsoft, Apple, IBM) have been striving to deal with the rising menace of cyber crime, there is dire need to develop strong anti-virus software's to ensure information security....
11 Pages (2750 words) Research Paper

Medical Center of DeVry

Lastly, the application of firewalls and passwords to limit the people accessing information of the patient is crucial.... Procedures As a means of countering this vice, it is necessary to adopt centralized system management to enhance data security.... Any intrusion or distortion of information of which he is authorized to protect will be viewed as a lapse of the security capacity of the hospital (Hubner, Costas &Pernul, 2007)....
9 Pages (2250 words) Term Paper

Health Information Management

For example, the legislature may establish changes in the law on health insurance (Campbell, 2004).... Running head: HEALTH INFORMATION MANAGEMENT Health Information Management (HIM) Legal Aspects (name) (school) (date) Health Information Management (HIM) legal aspects Case Study #1 Describe the roles that each of the three branches of the US government plays in creating changes in the law and in regulations.... Answer: Each branch of the government has their role to play in creating changes in the law and regulations....
9 Pages (2250 words) Case Study

Major Threats in Cybersecurity

Training employees adequately on security and dividing critical functions among them limits frauds or sabotage committed solely (Cappelli, Moore, Shimeall & Trzeciak, 2006).... The editors give the example of the Carlifornia Law of Data breach Notification which requires that whenever someone's personal information gets compromised, organizations have to notify individuals.... Name: Title: Course: Tutor: Date: Cyber security Topic 1 Companies globally continue to record increasing incidences of cyber attacks with the recent years recording remarkable increase in both the rate and sophistication....
3 Pages (750 words) Coursework

Marketing Analysis of Cisco Product

Juniper is a competitor in an over $7 billion security market it competes in the manufacture of VPN hardware and software firewalls.... The company is a service provider in the most critical industry; security.... The company manufactures security equipment for governments and security agencies besides hosting client information around the world.... The company operates and strives to promote and conduct ethical business guided by Code of Business Conduct, corporate governance and ethics program established under the law and the industry regulatory framework....
3 Pages (750 words) Assignment

Login Issues to Health Networks in a Hospital Environment

??……………………………4 Technical responsibilities by health institutions……………………………………………6 Legal Provisions by HIPAA………………………………………………………………8 Provisions on breach….... This is breach to rules and regulation governing informational management in healthcare organizations (Hill, 2000).... Studies have also indicated that with poor management of IT systems illegal logins may significantly dent an organization effort to ensure security of their stored data and records....
9 Pages (2250 words) Essay

Examination of the Technologies Currently Employed for the Detection of a Worm Attack and Its Subsequent Negation

nbsp;… One of the most important issues confronting network administrators and, indeed, any individual or entity connected to a network is security.... While not wanting to exaggerate the dimensions of the security problem, the fact is that every second of connectivity could mean vulnerability to attack or unauthorized access.... The desired result of an attacker is to compromise security.... The analogy of a chain is often used when describing the security of a system, in that the weakest member of the system will undoubtedly be the first to fail when tested....
36 Pages (9000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us