StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Security - Research Proposal Example

Cite this document
Summary
Information Security in Small Business Firms (Name) (University) Information Security in Small Business Firms Introduction The explosive growth of internet has added to the efficiency and convenience of modern business operations. However, a wide variety of information security threats, particularly computer hacking raises potential challenges to keeping and transferring information securely over the internet…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful
Information Security
Read Text Preview

Extract of sample "Information Security"

Information Security in Small Business Firms Information Security in Small Business Firms Introduction The explosive growth of internet has added to the efficiency and convenience of modern business operations. However, a wide variety of information security threats, particularly computer hacking raises potential challenges to keeping and transferring information securely over the internet. Even a small business organization needs to deal with huge volume of confidential and sensitive information.

Evidently, unauthorized access to such information would hurt the stakeholder interests and thereby the firm’s reputation. Therefore, advanced information security measures are vital for even the smallest business organizations. Threats and Vulnerabilities Small businesses having limited knowledge of computers, networks, and software are highly vulnerable to a range of serious information security threats. According to the National Institute of Standards and Technology (NIST), major threats include denial of service attack, malicious code, and virus attack.

The growing rate of computer hacking activities is the major factor making small businesses vulnerable to information security threats. Computer hackers include different groups such as experimenters, hacktivists, cyber criminals, and information warriors (NIST). Among them, hacktivists and cyber criminals pose greatest threats to business firms. Hacktivists combine hack and activism to achieve their stated political or organizational goals. In contrast, cyber criminals try to obtain unauthorized access to an organization’s sensitive information and use such information to threaten the sustainability of the organization for personal financial gains.

Evidently, increased threat of hacking would adversely affect the confidentiality and integrity of information. Today businesses maintain advanced systems to improve customer accessibility to information. However, hackers often take unfair advantages of such facilities to crack information security. Hacking activities can have a negative influence on the authenticity of information because hackers can alter or modify information once they gain access to information. McCullagh and Caelli (2000) state that in the sense of information security, non-repudiation refers to a service that provides proof of the origin and integrity of the data.

Certainly, small business organizations cannot promote non-repudiation services unless they are properly informed of computers, network, and software and hence prevent security threats effectively. According to the Computer Security Institute Survey (as cited in National Institutes of Standards and Technology video), nearly 42% small business firms reported laptop theft whereas another 42% reported an insider abuse. Half the participants (50%) reported that they had experienced one or other form of virus attack.

When 21% small businesses indicated a denial of service attack, 20% firms pointed that there system had been made into bots (NIST). Recommendations As Lin and Chiueh (n.d.) describe, a denial of service attack (DOS attack) or distributed denial of service attack (DDOS attack) is an attempt by hackers to cut the availability of a network resource to its intended users. This type of attacks generally involves efforts to interrupt services of a host linked to internet temporarily. Common security solutions like filtering or anomalous packets based rate limiting are not sufficient to prevent DOS attacks.

At present, the most effective way to handle DOS attacks is employing the Turing Test mechanism. Nowadays graphical CAPTCHAs are widely used to deal with this kind of situation. Graphical CAPTCHA “consists of a picture with some degraded or distorted image which will make up a lot of valuable bandwidth especially in the case of the attack.” (Lin & Chiueh, n.d.). The authors add that in case of DOS attacks, graphical CAPTCHAs containing degrades or distorted images are sent from the server to the client for authentication and this technique is capable of preventing such an attack successfully.

According to Lin and Chiueh (n.d.), low bandwidth Turing test is better for preventing DOS attacks more effectively; and text-based question answering is one of the most effective low bandwidth Turing Test mechanisms used today. Expected Impacts or Outcomes Undoubtedly, improved information security mechanisms would assist even small business firms to strengthen the security of their databases and operational efficiency. Hence, the benefits of maintaining such security mechanisms can outweigh their costs.

It is clear that ineffective or nonexistent protection measures would cause information systems to compromise its security, and such a situation in turn may increase the system maintenance costs of the firm. Conclusion In total, even small businesses are vulnerable to many information security threats such as DOS attacks, malicious code, and virus attacks. The growing incidence of computer hacking activities raises serious challenges to the sustainability of small business organizations across the world.

Currently, Turing Test mechanism is an effective strategy to prevent DOS attacks as it improves the information security of businesses. References Lin, S & Chiueh, T. (n.d.). A Survey on Solutions to Distributed Denial of Service Attacks. Retrieved from http://www.ecsl.cs.sunysb.edu/tr/TR201.pdf McCullagh, A & Caelli, W. (2000). Non-Repudiation in the digital environment. First Monday. 5 (8). Retrieved from http://firstmonday.org/ojs/index.php/fm/article/view/778/687 National Institutes of Standards and Technology.

Retrieved from http://csrc.nist.gov/groups/SMA/sbc/library.html#04

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Security Research Proposal Example | Topics and Well Written Essays - 750 words”, n.d.)
Information Security Research Proposal Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1482972-information-security
(Information Security Research Proposal Example | Topics and Well Written Essays - 750 Words)
Information Security Research Proposal Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1482972-information-security.
“Information Security Research Proposal Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1482972-information-security.
  • Cited: 2 times

CHECK THESE SAMPLES OF Information Security

Policies and Procedures Organizations Should Implement to Protect Themselves

Professional ethics plays crucial role in helping Information Security professional to execute their duty.... However, to ensure maximum Information Security, organizations need to institute relevant legislations to guard against Information Security breach.... Protecting the firm from possible Information Security breach should be a major focus of the company's operational process.... Recommended Information Security Policies for Organizations Control over Access to Computer Rooms In order to ensure high level security for crucial organizational information, computer rooms should be kept under lock and key at all times....
4 Pages (1000 words) Essay

Information Security Management

This paper ''Information Security Management'' takes a look at the security threats that an SME faces online and its need of Information Security management to tackle these threats.... This paper would take a look at the security threats that an SME faces online and its need of Information Security management to tackle these threats.... An effective Information Security management allows businesses to implement various measures that would protect various data and assets that the business owns....
18 Pages (4500 words) Research Proposal

Information Security Management

The paper ''Information Security Management'' tells that there are many approaches for Information Security assessment, the challenge is to find a set of approaches that fits the unique circumstances of an Accounting Company.... The TMA01 evaluation reveals that the references to various vital aspects of Information Security.... hellip; On the whole, with the lack of rigor, one can say that the firm faces many different Information Security risks, and the challenge is to find an approach that best surfaces these risks for Accounting Company, given the state of TMA01 and the current circumstances of the firm....
10 Pages (2500 words) Essay

Information Security Measures

"Information Security Measures" paper states that a risk assessment approach is necessary for the development of systems with an acceptable level of risk.... nbsp; The study has been planned in several stages; review of relevant literature; study of architectures and measures in computing systems; a case study of security issues within a specific system; and recommendations for good practices for Information Security.... Information Security is not about looking at the past of an attack faced; neither is it about looking at the present with the fear of being attacked; nor is it about looking into the future about the uncertainty that might befall us....
5 Pages (1250 words) Coursework

Information Security Plan

nbsp;  Organizations are created by people, buildings and procedures, and these three ingredients can perform well only if they are assure of their security.... From the exchange of information for communication purpose to the exchange of secrets pertaining to the security of countries, cyberspace has become the medium of choice for everyone.... With the introduction of information technology, the risk of all above mentioned factors have increased....
15 Pages (3750 words) Case Study

Information Security Audit Tools

As the paper "Information Security Audit Tools" states, when audit systems are adopted, they assist to prevent the attacks and reduce their associated consequences.... elow shows Information Security management.... : Information Security management.... These risks can be prevented by installing Information Security to protect the organization's software from intruders.... Thus, this paper will seek to discuss, in detail, some of the Information Security audit tools....
10 Pages (2500 words) Literature review

Key Information Security Issues

This case study "Key Information Security Issues" presents the case scenario of Jack Doe that represents most of the internet users who are unaware of the presence of online attackers.... Furthermore, it demonstrates the usefulness of Information Security in an organization.... At times the acronym CIA is used regarding Information Security to refer to confidentiality, integrity as well as the availability of data.... With that, this report will detail key Information Security issues concerning Jack's handling of his work information, associated attacks, risks, impacts of attacks, countermeasures, and mitigation effects of the countermeasures....
8 Pages (2000 words) Case Study

Information Security Concept Map

… The paper "Information Security Concept Map" is a great example of a term paper on information technology.... Information Security ensures the integrity, availability, and privacy of data is protected.... The paper "Information Security Concept Map" is a great example of a term paper on information technology.... Information Security ensures the integrity, availability, and privacy of data is protected.... The primary function of Information Security is to prevent unauthorized access, disclosure, or modification of information in order to maintain reliable and timely access and use....
7 Pages (1750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us