StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Security - Report Example

Cite this document
Summary
This paper 'Information Security' tells that Dhillon & Backhouse stated that personal information amasses a lot of confidential information about personal interests, thoughts, education, interests, and financial status. A lot of this information is collected, processed, and stored in home-based computers, laptops, smartphones…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.3% of users find it useful

Extract of sample "Information Security"

Information Security Name Institution Course Lecturer Date Dhillon & Backhouse (2000) stated that personal information amasses a lot of confidential information about personal interests, thoughts, education, interests and financial status. A lot of this information is collected, processed and stored in home based computers, laptops, smart phones, tablets and notepads. The information is also transmitted via networks to other electronic devices Personal information security is vital to ensure privacy of secret information and document. Organizational information requires a lot of protection from competitors and hackers. This helps to avoid losses and damage of organizational reputation. Defending organizational information is an organizational, ethical and legal requirement. It ensures protection of organsational information about their customers, employees, products, research and financial documents. The regulation of information security has in recent years increased and improved drastically. The legality and security installation have been improved in organizational in attempt to maintaining information security. Information security is the (Dhillon & Backhouse 2000) Information security needs to observe different principles of information security. Such principles include confidentiality, integrity and availability of information. An organization requires security to ensure accountability as well as a risk management strategy. The information security data requires maintenance, accuracy, consistence and assurance of Information (Whitman 2003). As a result the information is supposed to remain unmodified by unknown or unauthorized individual. The information also should be readily available so as to assist in its functions. Consequently the security control and communication channels of the information must be functional. This ensures transparency and non-repudiations within an organization. As a result the need for security of information in an organization is very crucial in ensuring increased and the process of risk management is continuous and vital in an organization (Peltier 2005). This is because risks and vulnerability of information in an organization keeps evolving. The control of risks is thus subjected to change to insure cost, production, measure and efficiency of protected data. To ensure information security a risk evaluation process is carried out .The process starts with risk assessment which is done by group knowledgeable personnel. The assessment uses quantative and qualitative analysis of available information (Peltier 2005). The assessment should identify the assets such as software, hardware and data within an organization and estimate their value. It should in addition conduct an assessment of threat that originates from within and without an organization. A conduct of an assessment for different threats and determine the prospect that it can be dealt with. The Information Security can conduct an independent and professional evaluation of an organization. The evaluation should be subjective and independent. The evaluation need to make certain the actual information security operations are in compliance with administrative security policies. This ultimately benefits the review of the viability and efficiency of the concrete organizational operations The evaluation process involves the organization employees (Whitman 2003). It especially involves employees involved with information facilities and, information system managers, providers, users, maintainers and data owners. The evaluation should ensure that employees are constantly and effectively follow security regulations policies set by the government and the organization .The evaluation of employees also identifies the roles of information security staff in maintenance, protection and effecting information security in an organization A team of experienced and qualified engineers conduct evaluation on security of organization systems. The inspection can be done either manually or automatically using software to establish technical hitches and establish evaluation reports for analysis. The Information operation system also requires constant and regular evaluation on the different operating systems. These systems include operating system, hardware, and network operating and database management. The evaluation conducted need to confirm and ensure that hardware and software are working properly and are up to standard. The evaluation also ensures that the operating systems are in compliance with security policies and regulations (Peltier 2005). Evaluate procedures should also assess the policies, training, security, physical standards, technical security and quality control. The organization should then calculate the impact that each threat have on different asset (Peltier 2005). Then use qualitative analysis or quantitative analysis to Identify, select and implement appropriate control measures. An evaluation of the effectiveness of the control measures should also be taken before provision of required cost effective protection without any loss in production. The organization should ensure authenticity in an organization (Hong et al 2003). The information transactions and details in an organization should be constantly validated to ensure that they are genuine .The stakeholders involved should be authentified to confirm they are genuine and real ones. The authentificatification can be validated by use of features such features as the passwords and digital signatures which verifies that data is accessed by specified persons and data is sent by authorized persons (Hong et al 2003). This helps in risk management and avoids damage or distortation of information Whitman (2003) stated that an organization needs to obey the non-repudiation law. This means that the organization validates ones intention in implementing the obligations set out in a contract. This helps to ensure that any given party cannot refuse that it indeed transacted or received some data or conducted a transaction in an organization. Security evaluation is a process of assessing and measuring the threats and vulnerability in an organization and taking security measures .This promotes and enhances achievement of goals and objectives of an organization (Hong et al 2003). The process is continuous within an organization and must be conducted regularly. This is because the environment, technology and innovation in an organization keeps involving drastically. The software, hardware and backups need to be inspected regularly to ensure security of information. Control measures refer to the act of taking charge and responsibility before a risk occurs. It is a risk management practice that aims at protecting information in an organization. The control measures need proper, careful and selective choice depending on the risk and threat involved (Peltier 2005). Security control therefore aims at protecting the integrity, availability and confidentiality of information The administrative control measures refer to the written procedures, policies, guidelines and standards (Peltier 2005). They form a basis for managing information among employees and stake holders in an organization. Organizations and governments formulate these policies and regulations in an effort to ensure information security .Such policies may include the hiring policies, corporate security policies and password policies. These policies form the framework for selection and implementation of administrative information control measures. The security information is often faced with numerous challenges and limitations. One such challenge is that it is difficult to establish and predict threat and vulnerability in the organization operating systems. Security information threats and vulnerability are not easily and quickly detectable and noticeable. Some threats are also not manually detectable. Hong et al (2003) recommends that, they require sophiscated and modernized softwares to ensure high quality information safety. A good example is mass information that is distorted or tampered with. It may not be easy to detect the distortations manually unless an employee is tasked with a task of reading the data. Even in such an event an employee is not able to detect the distortations if they were not conversant with the original documents. The findings of this research recommends that software be developed that can identify any distortation of data to prevent hacking and counterfeit data that may bring loss and ruin an organizations reputation. The findings of this research indicate that the information security policies are approached upon trial and error method and are often challenged by the operation system users. Instead of formulating policies that are regularly and constantly formulated and updated; policies are reviewed after a very long time (Dhillon & Backhouse 2000). As a result, the policies established are sometimes passed by time and technology thus, reduced information security .The polices formulated by a company and government should therefore, be constantly reviewed to fit the global changes of technology and innovations. This will also ensure easy validity of information in an organization to prevent gross loss. However, as Dhillon & Backhouse (2000) observes, information security is has endured a lot of innovation and transformations. These innovations have helped in curbing the threats and vulnerability in an organization. The creation of awareness and training of members of the public has helped to prepare the public society psychologically and mentally for fake information from different source and organizations. For example the public is made aware in advance by use of other methods of communication on a company’s progress, plans and promotions. Security information targets the prevention of conning, hacking and damaging an organizations reputation. The development and use of specific code numbers also helps the public to identify and counter fake data .These developments, innovations and creation of awareness through teaching and training has helped increase information security (Gordon & Loeb 2002). It is therefore recommendable that organizations identify and incorporate other methods of communication to ensure that the public and especially the customers get genuine and original data. The development of security information policies has in addition helped to safeguard information.Policies ensures that the authecity of data is specified and identified.The use of such policies as passwords and digital signatures ensure that access to certain information is more elaborate and safeguarded .This is because only authorized persons have access to password or signatures used in technology. This helps to prevent damage and loss of organizational information. According to Dhillon & Backhouse (2000), constant reviews on backup and software of information operations also helps to ensure that data is not lost in an organization. The information backups are tested constantly to detect threat and damage of information. This helps to ensure that the customers and other stakeholders receive the appropriate information thus safeguarding and promoting an organizations reputation and products. The economic and global changes have enhanced the role of information security (Gordon & Loeb 2002). Organizations have therefore to develop and safeguarded their data. Innovation of information security measures in an organization is essential in improving methods and means of information storage and recovery of data as well safeguarding organizational data from hackers and competitors who may damage or distort organizational data to create competitive advantage. Organizations should therefore monitor its data by adaptation of recent and enhanced information security technology to increase data security and enhance production while reducing competitive advantage. Information security is perceived as the practice of protecting data from unauthorized person. It helps to ensure privacy to personal or organizational information. This privacy is important in safeguarding a product and discovery in an organization .It also helps to safeguard the promotion and marketing of products .It is therefore vital to protect organizations data to ensure genuine and accurate data is received. Consequently, information security will enhance marketing, promotion and productivity thus increasing profitability in an organization. References Gordon, L A, & Loeb, M P 2002 The economics of information security investment ACM Transactions on Information and System Security TISSEC, 54, 438-457. Denning, D E R 1999 Information warfare and security Vol 4 Reading MA: Addison-Wesley Anderson, R 2001, December Why information security is hard-an economic perspective In Computer Security Applications Conference, 2001 ACSAC 2001 Proceedings 17th Annual pp 358-365 IEEE. Dhillon, G, & Backhouse, J 2000 Technical opinion: Information system security management in the new millennium Communications of the ACM, 437, 125-128. Jain, A K, Ross, A, & Pankanti, S 2006 Biometrics: a tool for information security Information Forensics and Security, IEEE Transactions on, 12, 125-143. Whitman, M E 2003 Enemy at the gate: threats to information security Communications of the ACM, 468, 91-95. Peltier, T R 2005 Information security risk analysis CRC press. Hong, K S, Chi, Y P, Chao, L R, & Tang, J H 2003 An integrated system theory of information security management Information Management & Computer Security, 115, 243-248. Workman, M, Bommer, W H, & Straub, D 2008 Security lapses and the omission of information security measures: A threat control model and empirical test Computers in Human Behavior, 246, 2799-2816. Read More

It especially involves employees involved with information facilities and, information system managers, providers, users, maintainers and data owners. The evaluation should ensure that employees are constantly and effectively follow security regulations policies set by the government and the organization .The evaluation of employees also identifies the roles of information security staff in maintenance, protection and effecting information security in an organization A team of experienced and qualified engineers conduct evaluation on security of organization systems.

The inspection can be done either manually or automatically using software to establish technical hitches and establish evaluation reports for analysis. The Information operation system also requires constant and regular evaluation on the different operating systems. These systems include operating system, hardware, and network operating and database management. The evaluation conducted need to confirm and ensure that hardware and software are working properly and are up to standard. The evaluation also ensures that the operating systems are in compliance with security policies and regulations (Peltier 2005).

Evaluate procedures should also assess the policies, training, security, physical standards, technical security and quality control. The organization should then calculate the impact that each threat have on different asset (Peltier 2005). Then use qualitative analysis or quantitative analysis to Identify, select and implement appropriate control measures. An evaluation of the effectiveness of the control measures should also be taken before provision of required cost effective protection without any loss in production.

The organization should ensure authenticity in an organization (Hong et al 2003). The information transactions and details in an organization should be constantly validated to ensure that they are genuine .The stakeholders involved should be authentified to confirm they are genuine and real ones. The authentificatification can be validated by use of features such features as the passwords and digital signatures which verifies that data is accessed by specified persons and data is sent by authorized persons (Hong et al 2003).

This helps in risk management and avoids damage or distortation of information Whitman (2003) stated that an organization needs to obey the non-repudiation law. This means that the organization validates ones intention in implementing the obligations set out in a contract. This helps to ensure that any given party cannot refuse that it indeed transacted or received some data or conducted a transaction in an organization. Security evaluation is a process of assessing and measuring the threats and vulnerability in an organization and taking security measures .

This promotes and enhances achievement of goals and objectives of an organization (Hong et al 2003). The process is continuous within an organization and must be conducted regularly. This is because the environment, technology and innovation in an organization keeps involving drastically. The software, hardware and backups need to be inspected regularly to ensure security of information. Control measures refer to the act of taking charge and responsibility before a risk occurs. It is a risk management practice that aims at protecting information in an organization.

The control measures need proper, careful and selective choice depending on the risk and threat involved (Peltier 2005). Security control therefore aims at protecting the integrity, availability and confidentiality of information The administrative control measures refer to the written procedures, policies, guidelines and standards (Peltier 2005). They form a basis for managing information among employees and stake holders in an organization. Organizations and governments formulate these policies and regulations in an effort to ensure information security .

Such policies may include the hiring policies, corporate security policies and password policies.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Information Security Report Example | Topics and Well Written Essays - 1750 words, n.d.)
Information Security Report Example | Topics and Well Written Essays - 1750 words. https://studentshare.org/information-technology/2063763-information-security-evaluation-assignment
(Information Security Report Example | Topics and Well Written Essays - 1750 Words)
Information Security Report Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/information-technology/2063763-information-security-evaluation-assignment.
“Information Security Report Example | Topics and Well Written Essays - 1750 Words”. https://studentshare.org/information-technology/2063763-information-security-evaluation-assignment.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security

Information Security Program

This paper "Information Security Program" points out what Information Security governance is in a banking software company, its implementation.... The paper gives an Information Security policy that provides total control, hence compliance, to ensure effective Information Security governance.... It has also affirmed the degree of completeness of the security measures that were implemented and provided consultation services on Information Security particularly monitoring of threats from the internet....
14 Pages (3500 words) Case Study

Information Security Management Issues

The essay "Information Security Management Issues" analyzes the major disputable issues on the system of Information Security management.... Moreover, customers' issues produce the need for companies to manage Information Security properly and effectively.... Thus, an organized collection of procedures, people, and information technology (IT) structure that protects decisive systems and information, and secures them from inside as well as outside intimidations are known as Information Security management (ISM) (Sipior, & Ward, 2008), (Northern Illinois University, 2007) and (Grimaila, 2004)....
11 Pages (2750 words) Essay

Computer Information Security Certification

This paper ''Computer Information Security Certification'' has provided an analytical discussion and evaluation of various certifications in Information Security and presented the work that the certified individuals are mandated to perform.... Computer Information Security Certification Cisco Certified Internetwork Expert (CCIE) certification is offered by Cisco.... Introduction Computers systems and networks face many security threats such as unauthorized access and intrusion....
8 Pages (2000 words) Research Paper

Information Security Program Survey

Information Security Program Survey (Name) (University) (Date) Information Security Program Survey Introduction The National Aeronautics and Space Administration (NASA) is the United States' agency to manage the nation's aerospace research, aeronautics, and other civilian space programs.... Since the NASA needs to manage highly sensitive data, information, strategic plans, and space programs, the organization pays particular attention to its Information Security program....
4 Pages (1000 words) Essay

Successful information security management

Successful Information Security management involves an amalgamation of prevention, detection and response in order to deploy a strong security defense.... hellip; A system should also be able to counter incidents and raise proper procedures in case an Information Security incident occurs.... Information Security incident handling takes a stride forward in the Information Security management procedure.... Security incident management facilitates the development of security incident handling and planning including preparation for detection and reply to Information Security issues....
9 Pages (2250 words) Research Paper

Information security legislation

This realization is increasing in the wake of increasing theft occurrences and other Information Security… Organization currently need standards, in the past many organization mostly tended to use a single Information Security standard for example BS 7799 part 2 (an Never the less, times have changed and the recent past has seen a lot of regulations and legislation which impacts Information Security.... With increasing spotlight on Information Security in legislation and the media all over the world, companies are being faced with a complex need to conform to privacy and security regulations and standards....
19 Pages (4750 words) Essay

Information Security Measures

"Information Security Measures" paper states that a risk assessment approach is necessary for the development of systems with an acceptable level of risk.... nbsp; The study has been planned in several stages; review of relevant literature; study of architectures and measures in computing systems; a case study of security issues within a specific system; and recommendations for good practices for Information Security.... Information Security is not about looking at the past of an attack faced; neither is it about looking at the present with the fear of being attacked; nor is it about looking into the future about the uncertainty that might befall us....
5 Pages (1250 words) Coursework

Key Information Security Issues

This case study "Key Information Security Issues" presents the case scenario of Jack Doe that represents most of the internet users who are unaware of the presence of online attackers.... Furthermore, it demonstrates the usefulness of Information Security in an organization.... At times the acronym CIA is used regarding Information Security to refer to confidentiality, integrity as well as the availability of data.... With that, this report will detail key Information Security issues concerning Jack's handling of his work information, associated attacks, risks, impacts of attacks, countermeasures, and mitigation effects of the countermeasures....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us