StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Controls for Information Security - Essay Example

Cite this document
Summary
The present essay entitled "Controls for Information Security" concerns the way of controlling information security. According to Romney, information Security affects information systems reliability by ensuring that malicious threats do not cause downtime…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Controls for Information Security
Read Text Preview

Extract of sample "Controls for Information Security"

Controls for Information SecurityHow Information Security Affects Information Systems ReliabilityAccording to Romney, et al (2012), information Security affects information systems reliability by ensuring that malicious threats do not cause downtime. Users require accurate, comprehensive and timely data that the information security must protect from loss or theft by third parties (Romney, et al, 2012). This implies that an organization wants an information system that is reliable to produce the intended functions.

The other way that information security affects information systems reliability is the protection against data failure (Romney, et al, 2012). It is evident that data failures can lead to time wastage and costly expenditures to repair the damage caused due to loss of vital information. In this regard, data confidentiality, integrity and availability must be maintained with a viable information security system. The other third parties or unauthorized users must not gain access to the organization’s data since this reduces the credibility of the data (Romney, et al, 2012).

The performance of the information system depends on the security measures installed in the entire system. For instance, an organization should ensure that its systems maintain the essential tenets of data, which are confidentiality, reliability and accuracy. The process entails the installation of modern and updated information security system that protects the data against malicious access. Information security also ensures that all the users must protect their systems from usage by other persons since this can jeopardize the operations of the entire organization (Romney, et al, 2012).

The enhancement of data reliability occurs if the information transferred or retrieved is accurate and complete in its original function. How a Combination of Preventive, Detective, and Corrective Controls Can Be Employed To Provide Reasonable Assurance about the SecurityThe combination of preventive, detective and corrective controls is suitable for the security of an organization’s information system because the multiple control layers work together to avoid a single point of failure. The detective controls comprise of log analysis, intrusion detection systems and constant monitoring of the system (Romney, et al, 2012).

Similarly, the preventive mechanism identifies the probability of an attack and initiates control measures, such as IT solutions, physical security or change of controls and management. The preventive control functions towards identifying and blocking the malicious risks (Romney, et al, 2012). It involves the observation of safe computing practices that hinder unwarranted access by others. After the prevention measures, the corrective controls ensure that, the affected data can be restored to usefulness.

Considering this, the combination or the detective, preventive and corrective controls work through the entire systems by recognizing threats both internally and externally. Controls must always be in place in an organizational system since they protect the deletion, copying or transfer of data (Romney, et al, 2012). This implies that controls also serve as data security that may reach the hands of unauthorized parties. It is essential to install all the control strategies that function together towards achieving the organizational performance (Romney, et al, 2012).

This is because it is easy to thwart fraud cases that might involve the fabrication of data to suit the cyber criminals. The combination of the preventive, detective and corrective controls seal all the gaps that might allow network traffic or illegal access. The absence of one control mechanism gives a void where data can be lost or corruption of the system may occur. The management of the control tools also requires the usage of the various methods, such as the constant change of passwords and locking of computer rooms (Romney, et al, 2012).

ReferenceRomney, M. B. (2012). Accounting information systems. Frenchs Forest, N.S.W: Pearson Australia.

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Controls for Information Security Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Controls for Information Security Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/finance-accounting/1701259-controls-for-information-security
(Controls for Information Security Essay Example | Topics and Well Written Essays - 500 Words)
Controls for Information Security Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/finance-accounting/1701259-controls-for-information-security.
“Controls for Information Security Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/finance-accounting/1701259-controls-for-information-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Controls for Information Security

Discuss the information technology control

Organizations can use information technology controls to ensure safety and security of business transactions and data along with adding value through switching to a systematic approach of data management.... With general controls and application controls, organizations can ensure high level of safety and security of data and information that can be used to enhance the operational framework of the business.... The discussion aims at highlighting the importance and relevance of information technology controls in the business environment and more importantly in the organizational environment....
2 Pages (500 words) Essay

Information technology director security plan

security is not primarily a technical or technological issue but is a management issue as the incidents of lax security and bank failures due to redundancies and other management errors have increased.... hellip; security is not primarily a technical or technological issue but is a management issue as the incidents of lax security and bank failures due to redundancies and other management errors have increased.... security Plan security is not primarily a technical or technological issue but is a management issue as the incidents of lax security and bank failures due to redundancies and other management errors have increased....
1 Pages (250 words) Coursework

Information Security Access Control Methods

It is the initial process that authorizes the end users to establish the information security Access Control Methods of information security Access Control Methods Access controls: Are the methods that applied to control the ways of communication of users and the systems with other systems and resources.... information security fundamentals.... he three important security principles are also relate to access control:IntegrityAvailabilityConfidentialitya) Managing User Access:Managing user access includes the authorization of the user to a specific resource....
1 Pages (250 words) Assignment

Risk Assessment and Security Controls

This paper "Risk Assessment and security Controls" focuses on the business with its system located in an unsecured room that has two vulnerabilities.... nbsp;… To protect the network and system, the business owner must institute the following security measures - Physical security – put in physical security such as lock and key security because the system is in an unlocked room within the main building of the business....
1 Pages (250 words) Assignment

Security and Privacy Controls for Federal Information Systems

The present essay entitled "Security and Privacy controls for Federal Information Systems" dwells on the access control which is a security control family that consists of security controls denoted by the identifier AC and range from AC-1 to AC-22.... It is denoted by identifier AC-2: This control enables the organization to manage information systems accounts including identifying account types, establishing conditions or membership, identifying authorized users of the information system and specifying user privileges....
4 Pages (1000 words) Essay

Peer review Threats to Data Security (Virtual Lab

The staff is advised to identify strange individuals and report them to the security. Computer systems especially the servers, routers, switches and patch panels Peer review: Threats to Data security as presented by Amy Insert Insert One of my mates posts centered on physical security in an organization.... The staff is advised to identify strange individuals and report them to the security.... When such individuals gain access, they may alter network and system settings that may weaken the security system of the organization....
1 Pages (250 words) Research Paper

Audit and Control Security Technology

They have to emphasize their focus on forming a firm information security policy and consequently implement control measures that will prevent either access or/and manipulation of their data and systems.... This case study "Audit and Control security Technology" analyzes audit and control security technology used in banks as well as the aspects attributed to the technology.... With an effective security technology, the banks are capable of withstanding the threats, keeping its systems safe....
7 Pages (1750 words) Case Study

Information and Communication Technology Management and Information Security

When designing a system the determination of the number of categories needed for information security depends on the type of information that is in the organization as well as the purpose of the organization or institution.... This paper "Information and Communication Technology Management and information security" examines different categories that can be used for sensitive information answering the question of when designing a system, how does one determine how many categories are necessary....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us