StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information Security analysis - Dissertation Example

Cite this document
Summary
The present study involved a total of 124 organizations. At the beginning of the study, organizational background in terms of the nature of organization, sector represented, size, length of operation, existence of an IT department, and presence of personnel knowledgeable about information security…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Information Security analysis
Read Text Preview

Extract of sample "Information Security analysis"

Download file to see previous pages

The researcher states that of the 124 organizations involved in the present study, majority are public sector organizations from the education sector with a size of more than 1000 employees which have been in operation for more than three decades. Majority of the organizations have IT departments and employs at least one person knowledgeable about information security. Majority of the IT department staff in the respective organizations hold bachelor degrees, working in non-technical tasks, and whose working experience in the IT field is in the range of one to five years.

The knowledge level of employees working with information security in the respective organizations is neutral (neither poor nor good) broken down as follows: security management, neither poor nor good; access control, neither poor nor good; cryptography, poor; security models and architecture, neither poor nor good; telecommunications and networking, good; applications and system development, neither poor nor good; business continuity, neither poor nor good; law investigations and ethics, neither poor nor good; physical security, neither poor nor good; and operations security, neither poor nor good.

Given that the knowledge level of IT staff among the organization is mediocre (not poor, but not good either), majority of them either have no plans to acquire certifications in security or have plans but specified no definite time frame. As to information security, majority of the 124 organizations do not apply any information security standards and this majority is undecided whether or not to apply InfoSec standards in the future. . 5 Health Services 10 8.1 8.1 72.6 Food & Agriculture 4 3.2 3.2 75.

8 Transportation 4 3.2 3.2 79.0 Electricity 3 2.4 2.4 81.5 Water 3 2.4 2.4 83.9 Foreign Affairs Sector 1 .8 .8 84.7 Labour Sector 2 1.6 1.6 86.3 Tourism 4 3.2 3.2 89.5 Social Affairs Sector 4 3.2 3.2 92.7 Justice Sector 2 1.6 1.6 94.4 Islamic Affairs Sector 2 1.6 1.6 96.0 Media Sector 5 4.0 4.0 100.0 Total 124 100.0 100.0 As shown in Table 2, organizations from the education, military, trading and contracting, and banking and finance sectors represent 23.4%, 10.5%, 10.5%, and 8.9% of the total number organizations considered in the study, respectively.

Cumulatively, the aforementioned figures represent 53.3% of the total. The Embassy of Switzerland (2011) identified the following major sectors in Saudi Arabia: oil and gas, financial services, engineering and construction, medical equipment and healthcare, insurance, transport, electrical power systems, water resources equipment, telecommunication, food and beverage, and education. Table 3 shows the frequency and percentage distribution of the 124 organization when they are grouped with respect to size.

The organizations were categorized into five groups: 1 to 50 employees, 51 to 100 employees, 101 to 500 employees, 501 to 1000 employees, and more than 1000 employees. Table 3. Distribution of organizations according to size. Size of your organization Frequency Percent Valid Percent Cumulative Percent Valid 1 - 50 Employees 17 13.7 13.7 13.7 51 – 100 Employees 25 20.2 20.2 33.9 101 – 500 Employees 27 21.8 21.8 55.6 501 - 1000 Employees 11 8.9 8.9 64.5 More than 1000 Employees 44 35.5 35.5 100.

0 Total 124 100.0 100.0 It may be gleaned from Table 3 that 44 out of 124 organizations or more than one third of the organizations considered in the present

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Security analysis Dissertation Example | Topics and Well Written Essays - 21750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1394902-information-security
(Information Security Analysis Dissertation Example | Topics and Well Written Essays - 21750 Words)
https://studentshare.org/information-technology/1394902-information-security.
“Information Security Analysis Dissertation Example | Topics and Well Written Essays - 21750 Words”, n.d. https://studentshare.org/information-technology/1394902-information-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security analysis

Medium and Profession

hellip; This paper analyses three professions that I did not know about in the Internet medium: network architecture, Information Security analysis and telecommunications specialty.... information security Analyst The roles in this career include planning, developing, implementing, upgrading and monitoring of security measures so as to protect the Internet network systems from security risks (BLS 128).... Additionally, information security analysts teach users on network security precautions and respond to any security breaches appropriately....
3 Pages (750 words) Research Paper

Analysis of Amazon in the UK

The paper 'analysis of Amazon in the UK' looks into the analysis of Amazon.... The analysis aims at presenting majors technological enhancements as well as a business strategy in the UK.... om which is the worldwide leader of online business in the retail industry....
11 Pages (2750 words) Term Paper

Information Security Challenges and Technologies

This coursework "information security Challenges and Technologies" describes some of the major information security issues.... This paper presents an overview of information security, information security challenges, and the latest techniques to deal with these challenges.... hellip; In the past few years, information security has turned out to be a serious challenge for individuals and business organizations....
6 Pages (1500 words) Coursework

Compilation of Security Data Issues

The paper 'Compilation of security Data Issues' focuses on data security issues.... The paper is a compilation of ten security data issues.... Data security means safeguarding data, like a database, from disparaging forces, and from the undesired actions of unauthorized personnel.... hellip; The author states that unauthorized access to data is one of the data security issues affecting businesses.... Most organizations and businesses implement numerous forms of security by enforcing hardware remedies such as firewalls and routers....
12 Pages (3000 words) Report

Information Security of HoloStealers Pty Ltd and Smooth Electronics Inc

With the large number of business organizations providing similar products and services, competitor analysis has become a critical business activity.... It is through a comprehensive, effective and efficient competitor analysis that various business organizations get to understand what their competitors are doing for improvement of their products and services.... Competitor analysis prays a critical role of providing the market intelligence for competing business organizations....
24 Pages (6000 words) Essay

Information Security the Using Business Impact Analysis

This report "information security the Using Business Impact Analysis" discusses information security as an important aspect for the success of any given firm.... For a firm to enjoy the benefits associated with information security, all data and general information must be handled.... The need of enhancing information security has become an essential and integral part of any business across the world.... For Automotive Paint Suppliers, serving more than 1000 customers in Western Australia, the need of coming up with incident response and disaster recovery regarding information security is an urgent issue, based on the fact that more than 80% of businesses fail if faced with any form of information attack....
21 Pages (5250 words) Report

Analysis of Information Security of Health Record Systems

"Analysis of information security of Health Record Systems" paper takes a look at the importance of these technologies how applicable they are in medical institutions and if there are any recommendations that should be kept to ensure security and confidentiality of a patient's records.... hellip; Patients express less concern about the threat of security of their EHR records as the benefit of clinical use of computerized systems far outweighs the security risk involved....
7 Pages (1750 words) Term Paper

Security of Information in Business Organisations

That aside, the concept of information security is interpreted according to the specific purpose(s) for which protecting information by a particular businessman becomes a primary concern (Gupta, 2009).... The major purpose is to give an analysis of different forms of threats and risks in general and suggestions to solve problems of business information insecurity (Torkzadeh, 2006).... … INTRODUCTIONSecuring business information may be defined as a process of protecting any form of information that is vital to one's business interests and business's wellbeing (Cisco Systems Inc....
14 Pages (3500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us