Chapter 11: Security AdministrationOverviewSystem Administration Made Easy11
Examples of this sensitive data include:
Your company’s customer list, contacts, and sales volume.This information could be used by a competitor.
Your employees’ personnel data.There are privacy laws that protect this type of data.
Financial performance data, such as quarterly financial statements.There are strict SEC rules governing insider trading (see below for a definition of insidertrading).
Items specified in contracts with customers, vendors, or other parties.
There are two major sources of damage:
Accidental, such as:
Loading test data into the production system.This situation happens, unfortunately, more often than people admit.
A hardware failure.
A fire that destroys the data center.
A flood, hurricane, earthquake, tornado, or other regional natural disasters.
Deliberate, such as:
A disgruntled employee who deletes or damages files from the system.
A hacker who deletes or damages files from the system.
Other reasons for security are defined by laws, contracts and other parties.Security is a sensitive issue, and it has legal implications. One good example of security isinsider trading. Before defining insider trading, we have to first define insider knowledge orinside
Insider knowledge or inside information means you have information,which is not known or available to the general public. If the information is known to thegeneral public, it could affect the stock price. Insider trading is using inside information tobuy or sell stock and make a profit or reduce a loss. Even if you do not profit from the sale,you could be held liable.