StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Security - Essay Example

Cite this document
Summary
Every individual organization is open to the elements of worries which at times can influence the organization adversely (Elky, 2006). At this…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
Information Security
Read Text Preview

Extract of sample "Information Security"

Information Security Table of Contents Table of Contents 2 An Overview of Information Security 3 Ensuring the Effectiveness of the Information Security Policies 3Policies and Measures 4Protection of the Data and the Steps Involved 5Enhancing the Information Security 6References 7An Overview of Information SecurityThe basic concept of the information security in an organization involves providing assistance to the organization’s mission. Every individual organization is open to the elements of worries which at times can influence the organization adversely (Elky, 2006).

At this instance, the discussion will be based on the importance of information security of a healthcare organization named OUMC Edmond. The organization deals with healthcare so, because of its nature of work it needs to store a lot of information regarding healthcare, finance and similar other numerous sensitive information. Thus, it becomes must for an organization to safeguard and make certain about the security of all the stored data. The intention of the policy in relation to information security is to defend the privacy, dependability and ease of admission of the systems as well as the information’s (CMS, 2006).

Ensuring the Effectiveness of the Information Security Policies The organization OUMC Edmond checks with the security policies regarding the information security as how developed and effective they are by reviewing them occasionally and also by updating them. The organization also monitors that whether the employees are abiding by the policies or not. They keep a check that whether any unlawful access is being taking place or not. This is how the organization makes sure about the development and effectiveness of its policies regarding the safety of the data.

Policies and Measures There are numerous policies that can be implemented by organizations to make certain of the privacy, accessibility and dependability of the data. OUMC Edmond sets its security policies in order to protect the information. The organization applies specific security policies such as data ownership, security and classification, usage of password, cryptography, data content, physical security, and mail ownership in electronic form, measures to manage and prevent virus, accountability regarding the end user as well as acceptable use, security awareness, backup and even preservation of the records among others.

The above mentioned policies can be observed as the measures to prevent unlawful access to the information. The organization implements data content, data ownership, data classification and data security to deal with the stated issues. These are the security policies that are applied by OUMC Edmond so as to make sure of the confidentiality, accessibility and dependability of the data (Weise & Martin, 2001).Protection of the Data and the Steps InvolvedAn organization can protect itself from the loss of its data with the help of the Data Protection Act.

In order to abide by this act, an organization will have to discharge a variety of lawful responsibilities. The organization needs to inform the Information Commissioner in relation to the information that an organization is processing. Generally all the information are stored in transportable devices which can get damaged at any time so, it is important that the information is encrypted. The degree of safety offered by the encryption is required to be updated and rechecked occasionally to make sure that the data would be retrieved even if the portable device was damaged, stolen or lost.

Technological assistance should be taken in this regard. Apart from the technological safety, organizations need to have policies regarding the suitable usage and protection of the transportable devices that are being used and also confirm that the employees are appropriately skilled (Ico, n.d.).The implementation of e-business is now possible for organizations to access the data in case of catastrophic events such as fire (Butler, 2001). The security procedures of the information system also offer significant inputs in handling the information technology systems (Kissel & Et. Al., 2008).

Enhancing the Information SecurityHowever, the organization can implement effective systems of information technology in the form of software that would be tailor-made according to the requirements of the organization and would have high security control as well as highly protected. Organizations should keep an alternative back up of the data and ensure strict monitoring of the employees with regard to the security policies. These are the additional ways by which OUMC Edmond can further enhance their information security systems.

ReferencesButler, J., (2001). E-disaster Recovery Means Continuous Availability. Information Management: Strategy, Systems and Technologies.CMS, (2006). CMS Policy for Information Security. Centers for Medicare & Medicaid Services, Pp. 1-5.Elky, S., (2006). An Introduction to Information System Risk Management. SANS Institute InfoSec Reading Room, Pp. 1-14.Ico, (No Date). Data Protection FAQs- For organisations. Home. Retrieved Online on September 12, 2011 from http://www.ico.gov.uk/Global/faqs/data_protection_for_organisations.

aspxKissel, R. & Et. Al., (2008). Information Security. Security Considerations in the System Development Life Cycle, Pp. 1-44.Weise, J. & Martin, C. R., (2001). Data Security Policy – Structure and Guidelines. Sun Microsystems, Inc, Pp. 1-18.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Security Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Information Security Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1579894-information-security
(Information Security Essay Example | Topics and Well Written Essays - 500 Words)
Information Security Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1579894-information-security.
“Information Security Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1579894-information-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security

Policies and Procedures Organizations Should Implement to Protect Themselves

Professional ethics plays crucial role in helping Information Security professional to execute their duty.... However, to ensure maximum Information Security, organizations need to institute relevant legislations to guard against Information Security breach.... Protecting the firm from possible Information Security breach should be a major focus of the company's operational process.... Recommended Information Security Policies for Organizations Control over Access to Computer Rooms In order to ensure high level security for crucial organizational information, computer rooms should be kept under lock and key at all times....
4 Pages (1000 words) Essay

Common Information Security Threats

Common Information Security Threats Introduction The purpose of computers and other network systems is to facilitate information exchange; today, organizations are managed using computer network.... At the present, organizations face a number of security threats (Whitman, 2003), this paper explores the Information Security threats facing Apple Inc.... Information Security threats According to Grimes (2012), the threats in terms of Information Security faced by Apple Inc include: The threat on data Attackers today have invented mechanism to alter data, this involves the data the company utilizes internally....
3 Pages (750 words) Essay

Information Security Risks

This paper ''Information Security Risks''  objectives are the identification of the Information Security threat to contemporary global financial organizations.... The Information Security requirements that these frameworks have is going to be researched and any an attempt to assign it to the general categories of Information Security risks will be made to facilitate an easier management  Methods: We performed multiple literature searches on several areas of pertinent research and undertaken interviews and survey questionnaire in order most he relevant up-to dictate informal-to adults “Achieving Information Security is extremely complicated and requires the combination of technical resources and management procedures....
8 Pages (2000 words) Essay

Principles of Information Security

The paper entitled "Principles of Information Security" aims to analyze the problem faced by the Assessment Office and provide control recommendations.... security program plan is made when all the controls are identified.... The various controls that are identified are Identity Card, Backup procedures, Training/Awareness, Strictly Comply ITS security policies, Physical Protection of Server (CPU), and Proper Rechecking etc.... According to the text, information systems deal with various types of risks/threats, thus, the threat may be accidental, internal or from external sources....
10 Pages (2500 words) Essay

Technology of Information Security

However, the most commonly used scenarios TECHNOLOGY OF Information Security Technology of Information Security Affiliation At the present, the majority of business organizations use a distributed computing environment to store their data and information.... I have presented below three Information Security technologies:1.... EncryptionSecond Information Security technology that I have chosen is the encryption technology.... In addition, all of the above discussed situations come with a variety of security problems to consider....
2 Pages (500 words) Essay

Comparisons of Information Security Management Frameworks

Information management security frameworks are developed founded on a structured set of independent recommendations, processes as well as practices predominantly from the Information Security Management System Standard (ISO 27001).... Some of the benefits of possessing frameworks for Information Security management include the fact that they create a secure and well-arranged working environment while at the same time protecting information and information assets....
4 Pages (1000 words) Research Paper

Controls for Information Security

The present essay entitled "Controls for Information Security" concerns the way of controlling Information Security.... According to Romney, Information Security affects information systems reliability by ensuring that malicious threats do not cause downtime.... hellip; Users require accurate data that the Information Security must protect from loss or theft by third parties.... The other way that Information Security affects information systems reliability is the protection against data failure....
2 Pages (500 words) Essay

Information Security Plan

nbsp;  Organizations are created by people, buildings and procedures, and these three ingredients can perform well only if they are assure of their security.... From the exchange of information for communication purpose to the exchange of secrets pertaining to the security of countries, cyberspace has become the medium of choice for everyone.... With the introduction of information technology, the risk of all above mentioned factors have increased....
15 Pages (3750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us