9
7 Running Head: “Home Governance” Home Governance University of Advancing Technology Joshua Moatz August 17, 2014 HOME GOVERNANCE JOSHUA MOATZ

Information Goverance Paper

  • Upload
    trish

  • View
    12

  • Download
    3

Embed Size (px)

DESCRIPTION

Information Goverance Paper

Citation preview

Page 1: Information Goverance Paper

Running Head: “Home Governance”

Home Governance

University of Advancing Technology

Joshua Moatz

August 17, 2014

HOME GOVERNANCE Joshua Moatz

1

Page 2: Information Goverance Paper

Abstract

Information governance is the specification of decision rights and an

accountability framework to encourage desirable behavior in the valuation, creation,

storage, use, archival and deletion of information. It includes the processes, roles,

standards and metrics that ensure the effective and efficient use of information in

enabling an organization to achieve its goals. The word that matters most is

accountability. The root of all of our problems with information, and we do have lots of

problems with it, is the fact that there is no accountability for information as such. When

this affects our home life, especially home security, one must realize the foundations

both technology and one’s home sit on. If one chooses to ignore the problem of

accountability, then one opens themselves up for home security failure. So, the question

then raised is how does one improve home governance? How does one secure their

home safely? (Logan, 2010)1

HOME GOVERNANCE Joshua Moatz

2

Page 3: Information Goverance Paper

Home Governance

As one would say, “let’s talk shop.” Most home networks are password protected

from the gate now. Some people take it a step further and add an alarm system within

the home. However, many fail to realize that just relying on these systems with a basic

password and security in place, does not fully protect them. In fact, the majority of most

people stick with standardized passwords and never change them. This effectively

makes them easy prey to experience online invaders. So, simply, step one – improve

your passwords. You can start by making common sense your password. It’s less likely

to be discovered! However, one a serious note, changing your internet connection

password is not enough to keep your system safe. Try changing the password every

other month. By rotating passwords, your connection is less likely to be penetrated.

As a young adult with no kids, only bills as my responsibilities, I have no younger

mischief to worry about. However, let’s be honest, for those young parents out there, we

all know children are growing with technology. Therefore, they are the more likely target

to stumble upon or be the very person that allows for the right connections for a threat

to penetrate. Now, one solution is to keep small children off all of your tech in your

home but that’s no fun right? You horrible parent! No, instead there are many options

one should definitely explore. Parental settings within technology is definitely one of the

better routes to choose. For example, Xbox One and PlayStation 4 are technology

meant for families to play games. At the same time, each account requests a full name,

address, birthdate, sex, and sometimes even credit card information to set up the

account. Not so much a family safe system without a security plan. Parental settings on

devices do more than just shield a child from certain content.

HOME GOVERNANCE Joshua Moatz

3

Page 4: Information Goverance Paper

They also give the parent control of content surfing and monitoring where there

children go while exploring games or the console’s features. Now that I finished my

sales pitch for game systems to parents, take that same concept over to computers.

Most laptops and devices allow people to create individual users on the same device,

with one administrative user. By doing so, you can prevent certain groups from surfing

into hazardous areas, preventing your children from attracting the wrong kind of

attention. You can also increase your firewall protection and add virus protection

software, just as a safety precaution. Again, taking accountability to secure your own

protection is one of the best ways to improve home governance.

Who are these supposed home invaders of the internet? How do they devise

their devious plots? More importantly, how do you know when one crosses your path?

Social Engineers are your worst enemies. Social engineering is a term that describes a

non-technical kind of intrusion that relies heavily on human interaction and often

involves tricking other people to break normal security procedures. In this sense, a

social engineer may try to get you to give up information on your home because more

than likely that specific person or persons are interested in what you have stashed in

your place. (Rouse, 2010).2

So you put up a home security system and call it a day right? Wrong! As stated

before, technology brings a lot of positive things to the table but it only takes one person

to make that same technology detrimental. The same way hackers may exploit your

game consoles for your credit card information – they can and will use your own tech

against you. Your home can quickly go from surveying your home to unwanted

monitoring. This poses a dangerous threat but how do you prevent it from happening?

HOME GOVERNANCE Joshua Moatz

4

Page 5: Information Goverance Paper

You need to ask yourself the question, “Do I need this?” Allow me to explain. If

you live in a three room apartment, do you need a home security system? The most

likely answer will be no. One because most people in a three room place are just

starting out and have less to worry on the scale of home invasion. Two, because they

will less likely be targeted. However, in a family suburban home the question – “Do I

need this” will apply in the equation of prevention. Sometimes adding security systems

are a bad idea, especially when they become equipped with cameras and less form of

security control. If you do choose home monitoring, then it becomes more of specific

question of camera placement. More than likely, placing the camera outside with be less

of a threat to your own personal privacy because you can monitor who came and went

from your home at such and such hours.

What would you do if you were asked to separate your ‘personal’ email from

‘official’ email? What system do you know of that would allow this separation to happen

automatically? Easy, you say, save it all and sort it out later. And that, as it happens is

what most of us do, with e-mail, files, data and everything. We save everything – and

lawyers often give this advice – because it’s the easiest thing that we can do that we

assume will not get us into any kind of trouble. I suppose it’s all in how you define

trouble and whose trouble it is. Most of us don’t have to deal with the trouble this

causes: the wasteful expense, the potential legal repercussions, or the time and energy

someone else might have to spend figuring it out one day. Again, we’re back to

accountability. The truth, a lot of the time, laziness is another factor we have to get over

in order to protect ourselves and our homes from invasion. First line of defense in

security is always expect the unexpected. (Logan, 2010).3

HOME GOVERNANCE Joshua Moatz

5

Page 6: Information Goverance Paper

Home Governance comes down to simply being ahead of the curve. There really

is no trick to it. In this digital age, nothing is full proof. There is no absolute solution.

There is only a sense of precaution. How you conduct that precaution and where you go

with it is up to the individual. Taking accountability in Home Governance is a start.

Owning your home and your tech with the knowledge of keeping it secure is helpful.

Now, I could ramble on forever but my intention is no longer to bore you. Just make

sure you study this short essay well. If not, hit reset.

HOME GOVERNANCE Joshua Moatz

6

Page 7: Information Goverance Paper

References“What is Information Governance?” Logan, Debrea 2010 http://blogs.gartner.com/debra_logan/2010/01/11/what-is-information-governance-and-why-is-it-so-hard/

“What is Social Engineering?” Rouse, Margret 2010

http://searchsecurity.techtarget.com/definition/social-engineering

HOME GOVERNANCE Joshua Moatz

7