Protecting data from cradle to grave.

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • Additional Information
    • Subject Terms:
    • Subject Terms:
    • Abstract:
      The article focuses on computer security in the light of the security breach at Carnegie Mellon University in April 2005, where hackers gained access to the personal information of over 19,000 students. The systemwide review of data policies resulted in the university's reduction of the use of Social Security numbers, implementing new security-management controls around its Oracle databases. While centralized database security management is a sound first move, organizations should also consider the protection of the safety and integrity of data at other points. INSETS: How to implement data life-cycle protection;Google it.