Carefully read all instructions.
P.S: Put references and only use the links provided in this document.
you will write a paper explaining the ethics of managing databases. At least 2 pages:
Security Policies for a Pet Sitting Startup
Security Policies for a Pet Sitting Startup
You are the security expert hired for a pet sitting gig economy startup company. Your company will match pet sitters with customers who need a place for their pets. Vendors will be able to register; customers will be able to sign up, and your company will provide matchmaking services.
Your essay should answer the following questions:
· What data do you have that is potentially vulnerable?
· What are the risks if an attacker was to steal data from your database?
· What security rules will you enforce for people who work with the dataset?
Here are some technical resources that provide guidelines for security for a startup:
· https://www.bvp.com/atlas/security-for-startups (Links to an external site.)
· https://www.forbes.com/sites/forbestechcouncil/2019/10/02/cyber-security-for-startups-a-step-by-step-guide/#32d8e49d2010 (Links to an external site.)
· https://www.qat.com/business-security-tips-startups/ (Links to an external site.)
· The Cyber Security Survival Guide for Startups (Links to an external site.) The Cyber Security Survival Guide for Startups
How to write your report
When researching Target, think of yourself as a forensic scientist on a TV show like “CSI”. You are only called in after the disaster has happened. It’s not important to rush, but it’s important to step back and think, “What do I observe?” and “If that’s what I saw, why did it happen this way?”
Don’t start thinking about security policies until you have completed your Target data breach analysis. The research you do into the Target data breach will give you ideas for policies you can implement.
When you start writing security policies, think about the following:
· What types of workers will I have at my company?
· How much training does each type of worker need? A founder or technical architect may need no training; but someone who is hired in the customer service department might not know anything about your business.
· What level of data does each person have access to? What are the risks if they screw up?
Don’t focus on firing someone who makes a mistake. Instead, try to design a policy that will ensure that problems are found as soon as possible, and that the company can learn from its mistakes.