StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information and System Security - Essay Example

Cite this document
Summary
In the essay “Information and System Security,” the author discusses protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The terms information security and information assurance are frequently used interchangeably…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Information and System Security
Read Text Preview

Extract of sample "Information and System Security"

As a career choice, there are many ways of gaining entry into the field. It offers many areas for specialization including Information Systems Auditing, Business Continuity Planning. Information security is the ongoing process of exercising due care and due diligence to protect the information, and information systems, from unauthorized access, use, disclosure, destruction, modification, or disruption.

The never-ending process of information security involves ongoing training, assessment, protection, monitoring & detection, incident response & repair, documentation, and review. In recent years identity management has become increasingly important, especially in the financial services, healthcare, and government industries. Why identity management has emerged as a growing business and IT priority is no mystery. Obvious drivers include the need to protect one's intellectual property, data brand value, and customer loyalty from the potential damage wrought by electronically-based fraud and theft; the desire to cut technical support costs, increase productivity through self-service and enable integration across disparate platforms.

Less obvious reasons, but equally important, including the challenges presented by changing environments, such as mergers, outsourcing, federated systems, and global infrastructures, as well as industry and government regulations such as HIPAA, Sarbanes-Oxley, and Gramm-Leach-Bliley act. The dictionary defines hackers as, "a talented amateur user of computers, specifically one who attempts to gain unauthorized access to files on various systems." (Webster's pg. 610) In other words, a hacker is a person who creates programs that infiltrate your PC and steal valuable information.

It's hard to put a face on a criminal when he works miles away from you but is still just as effective as any other criminal. Thanks to Hollywood and the young group of kids that crowd the Internet; hackers have almost been made out to be artist-like. The movie "Hackers" makes its characters seem like misunderstood geniuses looking to express themselves. The Internet community doesn't help debunk the idea when in chat rooms and message boards you'll find its contributors immortalizing them. Hackers do more than just create programs to steal files.

"Many notorious hacks were not feats of programming, but masterful psychological ploys" (TLC, 2006). Hackers play on people's fear of viruses to cause damage to their PCs. Hacker hoaxes can be just as bad as getting a virus. For example, an email in 2002 was sent out warning people about a virus that may be on their computer (TLC, 2002). The email instructed them to delete a certain file on their hard drive because it's a virus but the file was actually vital to running Windows and deleting the file would make Windows crash.

Internet security should be a high priority on every person's list that owns a computer. It makes sense since the majority of PC owners use their computers to hold valuable information, rely on it for their work, and count on it as a tool for everyday life. An attacker could potentially destroy your computer and all the information saved within it. Even worse, that information could possibly be used by someone else just like a thief would steal your belongings from your home to sell. Prevention has come a long way in addressing the issue of hackers but everyday hackers are coming up with new ways to attack your PC.

The Internet is a great thing. It's not perfect but even its imperfections shouldn't deter your desire to explore the vast wealth of information that makes up the Internet. Being aware of risks and taking steps to protect yourself will ensure that you can explore the Internet without fear.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Information and System Security Essay Example | Topics and Well Written Essays - 750 words, n.d.)
Information and System Security Essay Example | Topics and Well Written Essays - 750 words. https://studentshare.org/information-technology/1529756-information-and-system-security
(Information and System Security Essay Example | Topics and Well Written Essays - 750 Words)
Information and System Security Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1529756-information-and-system-security.
“Information and System Security Essay Example | Topics and Well Written Essays - 750 Words”. https://studentshare.org/information-technology/1529756-information-and-system-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information and System Security

Information Systems Security

This report "Information Systems security" discusses a database that would include tenants and the building managers.... The company ought to put in place structures that will ensure information security in two main ways, (1) authentication and authorization, and (2) general policies and procedures.... The threat posed by such security menaces may damage a company's reputation or compromise the integrity of its confidential information, causing it to lose clientele as banks would in the case where credit card numbers are leaked....
6 Pages (1500 words) Report

Security and the Technological Revolution

Back-off is a Malware program that is installed in the Point of Sale (POS) terminals by cybercriminals in order to collect credit card information and transaction data of the users.... A critical examination of the changing ways of perpetrating crime will validate the importance of technological revolution in the security profession.... The study will embark on investigating various technologies that are applicable in the security profession, and also document… According to David (2015), ways of perpetrating crime are ever changing hence dictating the need to apply new technologies within the security profession in order to address them....
15 Pages (3750 words) Research Paper

Automated Trust Negotiations Using Cryptographic Credentials-System Security

This paper "ATN Using Cryptographic Credentials-system security" seeks to offer solutions to certain intrinsic issues originated during the use of traditional Automated Trust Negotiations.... While the actual negotiation could be private and need to disclose only parsimoniously; the information is obligatory in a mutually reciprocal way.... For this, individuals and entities must establish mutual trust prior to any communication; especially when the information to be carried is sensitive....
9 Pages (2250 words) Term Paper

Installing and Administering IPSec

This paper "Installing and Administering IPSec" presents an introduction of a security standard, called, IPSec and its capabilities in ensuring secure communication in the network.... IPSec basically uses a combination of protocols such as Authentication Header, Encapsulating security Payload, etc.... hellip; Each protocol plays its part in improving the security, integrity, and confidentiality of communication by using different algorithms for encryption and authentication....
9 Pages (2250 words) Term Paper

Information Security Strategy of IT Department at Eazee Shopping

The researcher will then demonstrate the organisational policies of Eazee Shopping followed by physical and system security initiatives.... This paper "Information security Strategy of IT Department at Eazee Shopping" focuses on the threats to information systems in the cyberspace.... nbsp;… The researcher will then discuss the compliance of information systems and security initiatives with ISO – 27001 Standard after which a conclusion will be presented to summarise the key findings and scope of security strategies....
10 Pages (2500 words) Case Study

Information System Security Plans

According to research findings of the paper “Information system security Plans”, the greatest impact on the system comes from performances of individuals.... The basic document in the security process has been the IT since it defines features and controls of the system security.... hellip; The desire to have the applications in place has been pushed by the recent attacks that initiated the need to ensure the highest level of information security practices....
5 Pages (1250 words) Coursework

How Is Information Made Secure and Why Is This Necessary

It is therefore important to ensure that the integrity, confidentiality, and availability of the data to the concerned parties are maintained throughoutIntroductionInformation security refers to protecting information and the systems of information from being accessed by the sources which are not authorized the disclosure, use, disruption, inspection, perusal, modification, destruction, or recording (Pauline, Julie, & Martin, 2003).... It should also be able to safeguard the completeness and the accuracy of this information and the methods used to process it, therefore maintaining its integrity....
7 Pages (1750 words) Literature review

Information Technology and Information System Security

… The paper "Information Technology and Information system security" is an engrossing example of coursework on information technology.... The paper "Information Technology and Information system security" is an engrossing example of coursework on information technology.... However, it is quite unfortunate that individuals entrusted with the responsibility to maintain the security posture of their business processes, personal computing systems, and environments are not well-informed that security is changing rapidly....
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us