Deficiencies of Compliancy for Data and Storage: Isolating the CIA Triad Components to Identify Gaps to Security

HB Goodman, P Rowland - National Cyber Summit (NCS) Research Track …, 2021 - Springer
There are many reasons to implement data protection security strategies regardless of if the
data is financial, personal or confidential, risks are a moving target. The purpose of this …

Strategies to Protect against Security Violations during the Adoption of the Internet of Things by Manufacturers

S Ekwo - 2021 - search.proquest.com
Security violations have been one of the key factors affecting manufacturers in adopting the
Internet of Things (IoT). The corporate-level information technology (IT) leaders in the …

Analyzing the Effectiveness of Legal Regulations and Social Consequences for Securing Data

HB Goodman - 2021 - scholar.dsu.edu
There is a wide range of concerns and challenges related to stored data security–which
range from privacy and management to operations readiness, These challenges span from …

Strategies to Reduce Small Business Data Security Breaches

S Knight - 2020 - search.proquest.com
Organizations affected by data security breaches may experience reputational damage and
remediation costs. Understanding the data security strategies needed to protect small …