security

2760 Words6 Pages

Introduction This essay discusses security design options for a problem faced by a newspaper company. National newspaper would like to conceal their activities regarding to publish government’s sensitive information. For months, national newspaper is going to do research involving many allies like government whistle-blower, international collaborator, and other resources. Therefore, the teams who responsible to this issue may need a suggestion about security design between them. They are going to exchange a large volume of data and use communication system between journalists and resources. Besides prerequisite a strong secure communication system, newspaper company also concerns about confidentiality of work-in-progress stored inside their local storage. They may want to apply secure inventory management to store data securely until it is published. They may give different privileged among their staffs to access their data. They should prevent “a snake in the grass” that probably leak their asset to government, and only trust to small group of people. This essay will further talk about two main things, how to build secure communication system and how to manage secure inventory management. The thing that should be considered first is the threat. The threat would most probably come from government, who has powerful capability as an adversary. This essay also discusses what kind of threat system can be handled. Threat Capablities Most country has its intelligence agencies that doe some secrets activities in order to keep secure their country. Some of them achieve it with mass-surveillance program that now is widely known by public. In India, government owns Centralized Monitoring System (CMS) program that able them to collect ... ... middle of paper ... ... Conclussion Building a secure communication system and maintaining policy regarding the data inventory should be concerned by Newspaper Company who held sensitive information about the government. Though Government seems like has unlimited power to gather whole information, still it is not impossible to minimize the risk but still by using the reasonable cost. Hiding identity by randomize header data using open-source program, and being a costumer of encrypted mail provider are recommended things to do for a basic protection when contact and collaborate with informer. Bring the results from informant to safe storage and maintain its security regularly is the next steps to continue work-in-progress. Building the awareness of security regarding to protect temporary data storage on private devices should be also built individually to decrease the unwanted accident.

Open Document