StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Best Practices - Case Study Example

Cite this document
Summary
The paper "Security Best Practices" tells us about information security frameworks. COBIT is an IT governance framework for businesses wanting to implement, monitor and improve IT management best practices…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Security Best Practices
Read Text Preview

Extract of sample "Security Best Practices"

In order to find out the best practices of information security, I have visited and explored the websites of Microsoft, Oracle, Cisco, IBM, and Intel. I have noticed that all of these organizations have developed their own information security best practices or guidelines; moreover, some of these guidelines are the same in all organizations whereas others are specific to the equipment or technology, they have developed. These organizations have developed information security frameworks, security architectures, information security laws, information security policies, user training, and resource (Oracle, 2005). It is pertinent to mention here that the guidelines and best practices vary with respect to the medium or category of the technology; for example, the guidelines for information security of the information systems would be not similar to the best practices or guidelines of the computer network, mobile devices, online collaboration and social sharing, internet protection, electronic device security, etc (IBM, n.d).

One of the most common information security best practices that I have found in all the above-mentioned websites is to develop strong password protection for logging in / logging out of any system. One of the main reasons for emphasizing strong passwords is that despite the development and implementation of the latest technologies to protect secured information, the information can easily have unauthorized access if the user has not developed a strong password to secure its personal information. Moreover, most of the information leakage is due to the same reason, as a common hacker can attack to the vulnerability of a weak password and break into your information.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CIS Homework Case Study Example | Topics and Well Written Essays - 250 words”, n.d.)
CIS Homework Case Study Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1608205-cis-homework
(CIS Homework Case Study Example | Topics and Well Written Essays - 250 Words)
CIS Homework Case Study Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1608205-cis-homework.
“CIS Homework Case Study Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1608205-cis-homework.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Best Practices

Database security Questions

DATABASE security QUESTIONS Database security Questions Author Author Affiliation Date Q.... 1 As a new Database Administrator, the first thing that you should do is developing a Database security Plan As a new database administrator, the primary thing which we should do is to secure it from illegal and wrong access.... Yet, the security of the database is considered just a sub-module of the entire computer security analysis....
3 Pages (750 words) Essay

Network Security Best Practices

From the paper "Network Security Best Practices" it is clear that Regular maintenance of a network is vital to its security.... Based on the best practices for a secure network listed above, a company should then review and update its security policy.... The document should never be considered complete, as threats are continually adapting, and in this way, so should the security policy.... When it comes to securing your network, reliability and fail-proof security are vitally important....
8 Pages (2000 words) Essay

Homeland Security: Community Threat Assessment

Biometrics such as face recognition or iris scans can serve to discourage false identities and uncover deceptive practices.... The author states that it is important that state and local police have the capability to create and maintain computer records on all contacts with law enforcement....
6 Pages (1500 words) Assignment

Wireless Security Best Practices Guide for Business

The security policy has the following important specifications to follow for the best benefit.... Keeping this in mind every organization is in search of a good security policy to be jotted down which when followed keeps the company in safe hands.... This paper is all about the security policy which Every company in today's world is run on wireless network technology.... As it is defined in RFC 2196, the IETS's site security Handbook, a security policy is a formal set of rules through which people who are given access to organization's technology and information assets must abide to....
9 Pages (2250 words) Essay

Security awareness

The goal of the campaign is to ensure reinforcement of Security Best Practices.... Threats from inside the company continue to be the main source of information security breaches, and therefore effective security awareness.... Threats have continued to emerge from within the company due to inadequate awareness on issues targeting security among the workers in the company.... Organizing a security awareness campaign Dell is an American private Company with headquarters in Texas....
1 Pages (250 words) Article

Logical Fallacies; Argument Structure

In the advertisement, Microsoft employs an appeal to fear by claiming that tables may have turned when it comes to matters of Security Best Practices.... In addition, Microsoft attempts to sell strategies it considers the best in enhancing cyber security.... It offers structural analysis to develop transformational security programs that would be effective for corporations. ... he advertisement is comprehensive and explains the reason cyber security is a concern to many organizations....
2 Pages (500 words) Assignment

Microsoft Windows 7 Security Best Practices and Vulnerabilities

The basic objective of this research is to discuss the best practices and vulnerabilities of Microsoft Windows 7 operating system.... This paper has discussed the best practices of the Windows 7 Operating System and also some vulnerabilities of this system.... The basic objective of this research is to discuss the best practices and vulnerabilities of Microsoft Windows 7 operating system.... It has two sections: the first section has elaborated a number of the best features in Windows 7 OS....
11 Pages (2750 words) Research Paper

Tokenization vs Encryption

Vulnerability to Malware Data encryption exposes the data to attack by sniffer malware through breaches of Security Best Practices.... A choice between Encryption and Tokenization Even though both encryption and decryption perform the function of data protection, tokenization is the best method, considering its treatment of data.... Reduced Exposure to security threats Tokenization minimizes the exposure of data to destruction and theft by storing data in a separate location from the tokens....
2 Pages (500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us