Application Security and Data Protection
Application Security and Data Protection
(Student’s Name)
(Professor’s Name)
(Course Title)
(Date of Submission)
Application Security and Data Protection
Introduction
There are now many digital outlets where organizations can display themselves.
However, these only work if the organization controls what gets out. It is important to
understand the various ways these outlets could affect an organization so that the necessary
Social media has permeated the public consciousness to the point that most users wholly
depend on the platforms for information. This being their primary information source, they will
tend to believe what they read on the sites. The social media feeds of news organizations can be
especially desirable targets for people wishing to spread misinformation or discredit those trying
to disseminate accurate information. Also, the given the audience of the sites and the prominence
of popular accounts, an attack on them could provide the perfect platform for the hacker.
The technological age has placed a premium on applications and data for any entity
leveraging on technology. As such, any laxity in the securing of these resources has the potential
thing any organization desires to have. Maintaining this good requires a careful flow of
information that ensures the public will view the said organization in favorable light. However, a
breach in information security switches of the narrative from the reins of the organization. Once
the public gets a hold of information it wasn’t supposed to get, it is extremely difficult to control
The loss of business opportunities is a given in case an information breach occurs. First,
the organization will not only be spending time, but also resources in a bid to stem the fallout.
These are time and resources that would have otherwise been spent focusing on its core
operations. There are also legal implications in store after such an event. This is especially so if
the data stolen included personal identifiable information of its customers. The organization
could face lawsuits from those affected and sanctions from federal and state regulators.
Protection Policies
Web applications should be guided by the following policies to safeguard against web
originating threats.
The use of secure encrypted protocols like HTTPS as an added defense in web
communication.
All web communication should be filtered through security applications to screen for
threats.
After a social media account is believed to have been hacked, the owners should
Anti-phishing software should be installed on the email server and all spam emails should
The data an organization has should be granted the most robust information security
All data, whether in transit or at rest should be encrypted. Advisable encryption system is
The database server should be separated from the web server, preferably by using a
Access to protected information should only be for pre-approved users who should have
Downloads should only be allowed within certain parameters to prevent from the
Random security scans should be done to catch any time-delay threats that might have
Even after all logical security measures have been taken, the human component still
remains the most unpredictable of security risks. The organization can reduce likelihood of
security training should be an ongoing activity as newer threats emerge. Users should understand
how to identify potential threats and the appropriate response. They should understand how to
have a strong password and to never share it with anyone, including fellow employees. Social
engineering attacks can be prevented by ensuring the employees have full understanding of
legitimate communication.
As stated before, information security threats are constantly changing and this requires
that the above mentioned awareness and training programs evolve to reflect this. This way, they
will stay informed on the latest threats, how to identify them and how to respond to them.
Background security checks for employees with access to sensitive information should not be
References
https://www.websense.com/content/websense-2013-threat.aspx