Professional Documents
Culture Documents
Zilola
Zilola
4. Analyze and Control Is to Analyze and Control All of the Threats and
Vulnerabilities in Order to Minimize the Exploitation of the System The goal
of this step is to minimize the system's potential for being exploited. Control
may be technical, including aspects such as software, hardware, encryption,
and the detection of malware. Alternatively, control may be nontechnical,
covering aspects such as security policies, administrative action, and physical
and environmental mechanisms. Both technological and nontechnical control
will be necessary in the future for recognizing and avoiding control issues.
6. Documenting the Results is the sixth and last phase, which involves creating
a risk assessment report for the purpose of assisting management in making
future decisions on the budget, policies, and procedures. The report has to go
through all of the potential dangers and openings, as well as the effects of the
IT infrastructure and the dangers posed by the assets.
P6
A legislation that is supposed to be implemented to safeguard and manage personal
data from abuses committed by corporations and to ensure that these firms do not
exchange personal data with one another without first informing us of their
intentions.
Need of data protection - Because everyone uses and registers on the Internet in
order to buy products, pay taxes, or make appointments to go to the doctor, without
our knowledge, all of the data and information about us are stored in a database
system and are captured by companies even though we do not work or interact
with them. This highlights the need for data protection. A robust data protection
procedures and effective regulations for minimizing data exploration are necessary
in order to win back the trust of the general public in both the government and the
private sector.