StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The Economic Considerations Of Information Security And Its Management - Essay Example

Cite this document
Summary
The economic considerations of information security and its management.
A lot of research work has been carried out to understand the causes of system failures. Most of the studies acknowledged that a lot of security systems were failed due to some misplaced reasons…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.7% of users find it useful
The Economic Considerations Of Information Security And Its Management
Read Text Preview

Extract of sample "The Economic Considerations Of Information Security And Its Management"

Download file to see previous pages

However, the people who could care for a system were not the ones who suffered the costs of break down. This scenario can be explained with the help of some examples. Well structured billing-management features for the administrators who offered them, but were not so excellent at protecting customer’s privacy. For instance, automatic teller machines gone through under fraud in a lot of developed countries like the Netherlands and United Kingdom, where deprived rules and regulations left banks without enough encouragement to protect their information systems, and allowed them to pay the charges of fraud to their customers.

In this scenario, the internet is acknowledged as an insecure medium due to the fact that its liability for attacks is so diffuse. In all of these cases, the technical considerations of security are less important than the economic considerations (Anderson & Schneier, 2008), (NIST, 2010) and (Anderson & Moore, 2007). In this scenario, to implement a solution to this problem there is need to think about following questions like “do we need to spend an adequate amount of funds keeping viruses, attacks and hackers out of our corporate computer systems?

Or do we pay out too much for overall security management? Seeing that after the incident of 9/11, this kind of questions has gained a heightened significance. In this scenario, the economics can depict a lot of puzzling realities regarding internet security. For example, organizations implement email encryption and firewalls not due to the relative efficiency of these technologies, however due to the economic forces that force corporations to install these tools on their systems (Anderson & Schneier, 2008), (NIST, 2010) and (Anderson & Moore, 2007).

At the present, organizations hardly ever make public information concerning interruptions due to the economic reasons in doing so. For instance, an un-protected operating system is an international standard, partially for the reason that its financial results are mostly shown not by the corporation that built the operating system, however by the clients who bought it and used it. Furthermore, a number of major controversial cyber-policy matters also exist between information security and economics (Anderson & Schneier, 2008), (NIST, 2010) and (Anderson & Moore, 2007).

Economic theory forecasted that the worldwide recession will certainly augment the amount of cyber crimes as the financial recession deepens. There could be a lot of reasons of cyber crime such as an increase in security breaches and hit on more vulnerable and frantic people from those with cyber skills and cyber criminal position for desired income; and a reduced focus on investment in computer security as a result of fewer resources. According to the various researches, the assets of United States households have reduced up to approximately $1.

4 trillion; consequently the whole sum of money available to steal has reduced. However, this connection and causation are tremendously hard to demonstrate conclusively. In this scenario, it could be concluded that the cyber crime has been growing at very high rate for the reason that there are less difficulties for the criminals to perform their activities and almost no risk of being trapped and accused. However, this is apart from of the circumstance of the global economy. Despite the fact that appearing at the difficulty of workers of the growing marketplaces, this can be concluded that the financial situation of these nations has been significantly condensed with less hope of development of their condition, cyber crime prospects and thus the number of workers will increase (Guerra, 2009) and (Schneier, 2006). Possibly,

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Economic Considerations Of Information Security And Its Management Essay”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1411095-what-are-the-economic-considerations-of
(The Economic Considerations Of Information Security And Its Management Essay)
https://studentshare.org/environmental-studies/1411095-what-are-the-economic-considerations-of.
“The Economic Considerations Of Information Security And Its Management Essay”, n.d. https://studentshare.org/environmental-studies/1411095-what-are-the-economic-considerations-of.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Economic Considerations Of Information Security And Its Management

Information Security Management Issues

information security information security Author Author Affiliation Date Table of Contents Table of Contents 2 SLP# 1: information security Management: Frameworks & Principles 3 Security Issue 3 SLP 2: Belief & Culture: Build Awareness 5 SLP 3: Politics & Legislation 7 SLP 4: Economics: Cost/benefit & Incentive Design 10 SLP 5: Security via Technology 11 Passwords Technology 12 Firewall Technology 12 Encryption Technology 13 References 13 SLP# 1: information security Management: Frameworks & Principles It is an admitted fact that information is extensively shared in almost all the business communication processes amongst associates, workers, clients, and other stakeholders....
11 Pages (2750 words) Essay

Network Security

This research is aimed to highlight technology involved in network security, future trends of network security, companies adopting this issue, regulatory issues in network security and global implications.... How to utilize computers as well as internet technology in a safe way How to suitably exploit the business communication infrastructure On the whole, the prime causes following the formation of a safety policy is to set a business's sensitive data and information security basics....
13 Pages (3250 words) Research Paper

Food Development Program and Food Insecurity Combat

The problems of food supply and demand, problems of nutritional insecurities and problems of health and food safety are all important considerations of GAFSP (FAO).... The organization has established integrated pest management systems, which prevent pest diseases to come to rural food districts.... FAO has established a Global Information Early Warning System (GIEWS) which takes actions in food security situations prevailing in Qatar, Libya, Kuwait, and Morocco, etc....
13 Pages (3250 words) Essay

Security Management

Additionally, Return on Security Investment calculation aids the firm's management to know the extent to which the security investment is enough (Bruce, 2008).... This task looks at security management issues, dissecting aspects of ROSI with reference to Blackberry Company.... The firm thereafter decides on the most cost effective solutions to its security woes.... The Return on Security Investment aids the organization to determine if it spends too much on its security bids....
17 Pages (4250 words) Research Paper

Economic Considerations of Information Security and Its Management

It is not surprising that the quickly increasing body of research dwells on issues of information security.... Conversely, there has been very little attention towards addressing the economic aspects of information security; particularly with the magnitude of resources that have been directed to improve information management by organizations, what these organizations require is a framework that will assist in deriving optimal levels of spending on information security....
4 Pages (1000 words) Research Paper

Information Security Management in the USA

The basic issue in the paper “information security Management in the USA”, which the author has chosen for discussion is information hacking.... Thus, an organized collection of procedures, people and information technology (IT) structure that protects decisive systems and information, and secure them from inside as well as outside intimidations is known as information security management (ISM) (Sipior & Ward, 2008), (Northern Illinois University, 2007) and (Grimaila, 2004)....
10 Pages (2500 words) Dissertation

Need for Sound Information Security Management

Given these constraints, many small to medium firms ignore the issue of information security management, despite the fact that it is pivotal to their success.... Hence, this paper intends to explore the implementation of information security management in SMEs as compared to larger organizations.... Lack of resources necessary for hiring, or receiving professional advice and assistance from security domain experts creates narrower knowledge on the subject of information security in SMEs and it may be difficult for such companies to identify appropriate security products off the shelf, including anti-virus software and firewalls....
16 Pages (4000 words) Literature review

The Technology of Intelligent Building Management Systems

Simply put, an IBMS is a technology that integrates disparate systems by the centralized interface, provides significant benefits to all, uses technology and strategies for sustainability, is a shared network, allows free flow of information, and maximizes performance and efficiency by integration (Madsen, 2008).... This study aims at introducing the technology of intelligent building management systems and lists as well as critically discuss the security managers' considerations of intelligent building management systems....
13 Pages (3250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us