Securing and Protecting Information - Essay Example

Comments (0) Cite this document
Security and Protecting Information Instructor Institution Date Securing and protecting information Development of information security strategies protecting complex data and information across a wide network while also improving system performance as well as ensuring easy data retrieval when necessary is one of the most challenging tasks in network design (Dhillon, 2007)…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
Securing and Protecting Information
Read TextPreview

Extract of sample
"Securing and Protecting Information"

Information security includes protection of all forms of information and data including both physical and electronic forms. Information security encompasses four main areas that aim at safeguarding the whole integrity of the information collected and stored for future retrieval. These are availability of the data and information on demand, confidentiality, accountability on the part of individuals charged with the responsibility of managing the information, and data integrity (Dhillon, 2007). A security authentication process refers to the process of determining he individuals authorized to access, retrieve, alter and use information at specified times and in a specified manner. The authentication process involves putting in place measures to determine which individuals are authorized to access the information stored. Creating a security authentication process for any piece of information comprises of various steps. The first step involves identifying the information that needs to be protected. This entails an organization examining its records to find out which set of information is vulnerable and therefore seek to protect it (Allen, 2001). This may be employee details, market research, and product information among others. The next step is conducting an analysis of security risks associated with the information identified as being vulnerable. The organization needs to determine what types of risks are likely to interfere with the information. This may include hackers, physical force, loss of data through accidents, leaking of information to unauthorized parties among others. The next step is developing a security plan in line with the risks associated with the information identified. The security plan includes timelines for implementing the security measures and details of what needs to be done. The process then moves to the next step of developing a security policy detailing the specific measures to be taken to safeguard the information (Dhillon, 2007). After developing the policy, the next step is to develop the procedures to be taken in order to implement the security policies enacted. The next step is to seek support from relevant people regarding the measures taken. This involves achieving buy in from both technical staff and the managers of the organization. The users of the systems developed to protect the information will then be taken through the next step which is training. The last step in the process is to implement the policies and maintain and protect the information. There are various methods that can be used to ensure authentication and authorization process is enabled and that the information is protected as required. Authentication involves determining if a user is indeed who he claims to be in order to grant him the authority to access the stored information. There are two main components of an authentication process. First the authentication process can determine which type of users ought to access the information and the type of information to be accessed. The other component is determining the time of access, such that the information can only be accessed at specified times by the authorized individuals. The two components can be implemented simultaneously or each as a single authentication element (McNab, 2004). An authentication p Read More
Cite this document
  • APA
  • MLA
(“Securing and Protecting Information Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from
(Securing and Protecting Information Essay Example | Topics and Well Written Essays - 750 Words)
“Securing and Protecting Information Essay Example | Topics and Well Written Essays - 750 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Protecting Personal Information
Technology, along with its pros, has introduced exceedingly technical and chic means of acquiring someone’s PII. Whatever means the thief uses, identity theft brings great damage to the victim’s name and reputation as the victim is solely left responsible for whatever financial or personal loss he faces.
3 Pages(750 words)Essay
Securing America and Protecting Civil Liberties
In light of this, the government violated the first and fourth amendments of the constitution. The first amendment gave the US citizens freedom of expression of ideas and religious views while the fourth amendment allows for an individual’s privacy (Walker, 2004).
3 Pages(750 words)Essay
Securing America and Protecting Civil Liberties
However a fee months after the 9/11, it seemed like everything began to change as the evolution of the national security policies began to take place which not only posed a challenge to the American value of the civil liberties but posed a threat to the fundamental constitutional rights of the people who have little or no links with terrorism.
3 Pages(750 words)Essay
Securing America and Protecting Civil Liberties
The resulting terror and panic from the 9/11 tragedy directly led to the USA PATRIOT (Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism) Act, passed by the House of Representatives on October 24, 2001 (United States Government, 2001).
3 Pages(750 words)Essay
Securing America and Protecting civil Liberties
According to the research the signing of the Patriot Act led to the infringement of some rights like the right to privacy. The Act favored the executives since the citizens had no say to the implementation of the Act. The court nor the congress; did not oversee the implementation of the Act in any way.
4 Pages(1000 words)Essay
Sourcing and Securing Talent
This new aggressive strategy targets the traditional areas. The new strategy will be exercised by promoting products through product innovation, hence, taking in the 'first to market' positioning. Because of this, the company has decided to form a new division that will focus on the technological innovation for this three year strategy.
8 Pages(2000 words)Essay
Research Project : Information Security Management
Information systems are the various types of systems that are used to store useful information about individuals and companies. Information stored in computer systems is often under attack from different information security threats coming from different sources.
3 Pages(750 words)Research Paper
Hurricane Katrina Securing the U.S. Southern Border: An Assessment of the Department of Homeland Security
While a section of the public feels that the Department of Homeland Security has been quite effective in dealing with security issues such as the securing of the southern border and emergencies such as the
8 Pages(2000 words)Essay
Intrusion Prevention and Detection: Securing Information
To cut the price of ownership, Symantec Host IDS is integrated with the Symantec Security Management System, which is an administration structure that offers
2 Pages(500 words)Essay
Securing America and Protecting Civil Liberties
Patriot Act and the ensuing court rulings that were adopted after the attack on the World Trade Centre. The patriot act gave authority to the investigators to come up with new surveillance techniques. America felt a strong need to strike a balance between liberty and security as failed to understand the source which attacked them but knew that it had to be defeated (CAP, 2005).
4 Pages(1000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Securing and Protecting Information for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us