CIS 542 WEEK 2 DISCUSSION Question
"Protecting Personal Identifiable Information (PII)"
Your labs focus on Personal Identifiable Information (PII), which companies are responsible for protecting. Companies collect this information from employees and clients and typically store it in a database, making this an attractive target to hackers.
- Using the Internet, research methods you think corporations can use to protect themselves and their customers from security breaches involving PII. What tools or methods could you recommend to a company interested in determining the exposure of PII? Share your examples with your classmates and provide linksto any useful resources you find.
- After reading a few classmate postings, reply to the ones where you learned something new, or have something to add. Get in early to post your initial response to keep the discussion going.
"Protecting Personal Identifiable Information (PII)"
Your labs focus on Personal Identifiable Information (PII), which companies are responsible for protecting. Companies collect this information from employees and clients and typically store it in a database, making this an attractive target to hackers.
- Using the Internet, research methods you think corporations can use to protect themselves and their customers from security breaches involving PII. What tools or methods could you recommend to a company interested in determining the exposure of PII? Share your examples with your classmates and provide linksto any useful resources you find.
- After reading a few classmate postings, reply to the ones where you learned something new, or have something to add. Get in early to post your initial response to keep the discussion going.
"Protecting Personal Identifiable Information (PII)"
Your labs focus on Personal Identifiable Information (PII), which companies are responsible for protecting. Companies collect this information from employees and clients and typically store it in a database, making this an attractive target to hackers.
- Using the Internet, research methods you think corporations can use to protect themselves and their customers from security breaches involving PII. What tools or methods could you recommend to a company interested in determining the exposure of PII? Share your examples with your classmates and provide linksto any useful resources you find.
- After reading a few classmate postings, reply to the ones where you learned something new, or have something to add. Get in early to post your initial response to keep the discussion going.
No comments:
Post a Comment
Note: only a member of this blog may post a comment.