StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information Security - Research Paper Example

Cite this document
Summary
Title: Need for Information Security 1. Introduction The intervention of technology has increased competition for organizations since communication has broken geographical barriers and has transformed the world into a global village…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful
Information Security
Read Text Preview

Extract of sample "Information Security"

Download file to see previous pages

Lack of awareness and execution to protect company’s information assets can result in loss of revenues, bad reputation for the company and probable law suits by the customers for not being able to protect their data. 2. Threats and Vulnerabilities There are numerous types of threats and vulnerabilities that are required to be considered for the protection of information. Data breach is defined as the disclosure of information to unauthorized individuals in an intentional or unintentional manner.

Verizon Business Risk Team (2009) stated that the degree of data breaches is the highest in the modern times than it has ever been. Figure 1: Percentage of Different Types of Data Breaches from 2004 to 2008 (Verizon Business Risk Team, 2009) Data breaches tend to threaten the confidentiality, integrity and authenticity of the data. Confidentiality aspect requires the data to be hidden from unauthorized third parties to protect the privacy of the individual. Hash, Bartol, Rollins, Robinson, Abeles and Batdorff (2005) explained that integrity of data provides the assurance that it is not tampered with or modified at any level as a result of malicious intent.

Authenticity of data also ensures that the data is complete and accurate. The absence of such attributes of data makes the data unreliable and may prove to lead to misleading directions and results for the management of the organization. Data breaches may result from outside or inside sources. Moore, Cappelli, Caron, Shaw and Trzeciak (2009) defined insider theft as instances when employees (current or ex-employees) may disclose information for personal motives or as a result of lack of awareness of required information security measures.

Employees might help the outside intruders gain unauthorized access to sensitive data by leaking passwords or loopholes in the security systems. Such employees may also damage or destroy the data as a result of personal conflicts or grudges against the management. Outside sources of threats and vulnerabilities include denial of service (DOS) attack, virus and worms attacks. Houle and Weaver (2001) explained that DOS attacks are directed to impair the IT services and resources so that legitimate users cannot avail them.

Common sources that are witnessed to become targets are bandwidth, data storage services and computing power of a resource. Abundant fake requests are sent to the server to make it incapable and unavailable to cater the requests from legitimate users. Viruses and worms are also common threats that reside in a computer without the knowledge of the owner and perform spiteful actions to harm the data. Viruses and worms are automatically installed on the system if the user opens a compromised email attachment, visits an unreliable website, opens an infected image or clicks on a compromised online advertisement etc.

Non-repudiation was defined by Hole (2009); it ensures that the transfer of messages between participating parties is valid and real. Effective security measures need to be taken by companies to ensure that sender and receiver cannot deny the transfer and receiving of the messages, respectively. 3. Counter Measures for Improving Security Cannady and Harrell (n.d.) proposed a technique to tackle the threat of insider theft; they recommended that ‘user profiles’ should be developed and stored in the server.

These user profiles are developed on the basis of routine activities

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Security Research Paper Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1432997-information-security-white-paper
(Information Security Research Paper Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1432997-information-security-white-paper.
“Information Security Research Paper Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1432997-information-security-white-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security

Policies and Procedures Organizations Should Implement to Protect Themselves

Professional ethics plays crucial role in helping Information Security professional to execute their duty.... However, to ensure maximum Information Security, organizations need to institute relevant legislations to guard against Information Security breach.... Protecting the firm from possible Information Security breach should be a major focus of the company's operational process.... Recommended Information Security Policies for Organizations Control over Access to Computer Rooms In order to ensure high level security for crucial organizational information, computer rooms should be kept under lock and key at all times....
4 Pages (1000 words) Essay

Information Security Management

This paper ''Information Security Management'' takes a look at the security threats that an SME faces online and its need of Information Security management to tackle these threats.... This paper would take a look at the security threats that an SME faces online and its need of Information Security management to tackle these threats.... An effective Information Security management allows businesses to implement various measures that would protect various data and assets that the business owns....
18 Pages (4500 words) Research Proposal

Information Security Management

The paper ''Information Security Management'' tells that there are many approaches for Information Security assessment, the challenge is to find a set of approaches that fits the unique circumstances of an Accounting Company.... The TMA01 evaluation reveals that the references to various vital aspects of Information Security.... hellip; On the whole, with the lack of rigor, one can say that the firm faces many different Information Security risks, and the challenge is to find an approach that best surfaces these risks for Accounting Company, given the state of TMA01 and the current circumstances of the firm....
10 Pages (2500 words) Essay

Information Security Measures

"Information Security Measures" paper states that a risk assessment approach is necessary for the development of systems with an acceptable level of risk.... nbsp; The study has been planned in several stages; review of relevant literature; study of architectures and measures in computing systems; a case study of security issues within a specific system; and recommendations for good practices for Information Security.... Information Security is not about looking at the past of an attack faced; neither is it about looking at the present with the fear of being attacked; nor is it about looking into the future about the uncertainty that might befall us....
5 Pages (1250 words) Coursework

Information Security Plan

nbsp;  Organizations are created by people, buildings and procedures, and these three ingredients can perform well only if they are assure of their security.... From the exchange of information for communication purpose to the exchange of secrets pertaining to the security of countries, cyberspace has become the medium of choice for everyone.... With the introduction of information technology, the risk of all above mentioned factors have increased....
15 Pages (3750 words) Case Study

Information Security Audit Tools

As the paper "Information Security Audit Tools" states, when audit systems are adopted, they assist to prevent the attacks and reduce their associated consequences.... elow shows Information Security management.... : Information Security management.... These risks can be prevented by installing Information Security to protect the organization's software from intruders.... Thus, this paper will seek to discuss, in detail, some of the Information Security audit tools....
10 Pages (2500 words) Literature review

Key Information Security Issues

This case study "Key Information Security Issues" presents the case scenario of Jack Doe that represents most of the internet users who are unaware of the presence of online attackers.... Furthermore, it demonstrates the usefulness of Information Security in an organization.... At times the acronym CIA is used regarding Information Security to refer to confidentiality, integrity as well as the availability of data.... With that, this report will detail key Information Security issues concerning Jack's handling of his work information, associated attacks, risks, impacts of attacks, countermeasures, and mitigation effects of the countermeasures....
8 Pages (2000 words) Case Study

Information Security Concept Map

… The paper "Information Security Concept Map" is a great example of a term paper on information technology.... Information Security ensures the integrity, availability, and privacy of data is protected.... The paper "Information Security Concept Map" is a great example of a term paper on information technology.... Information Security ensures the integrity, availability, and privacy of data is protected.... The primary function of Information Security is to prevent unauthorized access, disclosure, or modification of information in order to maintain reliable and timely access and use....
7 Pages (1750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us