StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Discussion question - Essay Example

Cite this document
Summary
The term information security which is even recognized as InfoSec is used to refer to the attainment of balance between securitization of an organizations information assets and the requirement to continue operating the business without hindrances (Whitman, 2011, p.4). These…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.5% of users find it useful
Discussion question
Read Text Preview

Extract of sample "Discussion question"

Computer Security vs. Information security Computer Security vs. Information security The term information security which is even recognized as InfoSec is used to refer to the attainment of balance between securitization of an organizations information assets and the requirement to continue operating the business without hindrances (Whitman, 2011, p.4). These assets of information can be physical as well as technical in nature. The secure keeping of this information even includes hardware where these assets of information are secured (Tipton, 2012, p.182). The safe keeping of hardware even includes security of computers where information is secured.

This part of information security is recognized as computer security where professionals try to secure computers from being manipulated in order to obtain ensure that the information that is secured on these computers remain safe (Smith, 2000, p.101). Therefore, the security of computers is a part of the information security and these two terms should not be used interchangeably although they are commonly used to refer to each other. In case of information security, the professionals aim at securing the information of an individual as well as an organization and they do so by securing all the places where information is stored and used.

In the case of computer security, professionals try to secure various parts of a particular computer as on these parts the information of individuals and organizations is secured. These parts may include: hard drive, website, USB and CD ROMs. While securing information as well as computers, the professionals try to figure out vulnerabilities in the computer system and then they try to cover these gaps to make sure information is not stolen. ReferencesSmith, B., & Kidd, P. T. (2000). E-business: key issues, applications and technologies.

Amsterdam: IOS Press. Tipton, H. F. (2012). Information security management handbook (6th ed.). Boca Raton, Fla.: Auerbach ;. Whitman, M. E., & Mattord, H. J. (2011). Roadmap to information security: for IT and InfoSec managers. Boston, MA: Course Technology/Cengage Learning.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Discussion question Essay Example | Topics and Well Written Essays - 250 words - 10”, n.d.)
Discussion question Essay Example | Topics and Well Written Essays - 250 words - 10. Retrieved from https://studentshare.org/information-technology/1620994-discussion-question
(Discussion Question Essay Example | Topics and Well Written Essays - 250 Words - 10)
Discussion Question Essay Example | Topics and Well Written Essays - 250 Words - 10. https://studentshare.org/information-technology/1620994-discussion-question.
“Discussion Question Essay Example | Topics and Well Written Essays - 250 Words - 10”, n.d. https://studentshare.org/information-technology/1620994-discussion-question.
  • Cited: 0 times

CHECK THESE SAMPLES OF Discussion question

Search methods & techniques: Google vs library resources

But if I really like to read a book on paper and not through the computer, either I borrow it at the library, borrow from a friend who discussion question I usually look for sources in the Internet or through electronic databases that I can access through the net.... iscussion question 2:o Blog: http://www.... For this source, the article in question has posted a research paper on death penalty.... rmCourse=1598&frmWeek=2 The article in question is written by someone with a law degree and published in a law journal....
2 Pages (500 words) Essay

Journal about the text, Shame of the Nation, pages 1-37

art 3Discussion question 1 Will artists as mentors on weekend classes make children appreciate art?... iscussion question 2 Should parents be compelled by law to get involved in children's activities on weekends to reduce obesity?... He claims that diversity is eyewash and American public schools are opening practicing racial segregation in their schools....
2 Pages (500 words) Essay

The Era of Technology for the Environmental Based Issues

Chapter-10 discussion question-2 The current era has been recognized and referred as the era of technology in which there are number of things have been transformed and completed with the help of this particular thing.... Chapter-11Discussion question-2Public Law of United States (US) 480 stated that United States sells the surplus gains to the developing countries, which pay them in local currencies....
2 Pages (500 words) Essay

Reflection

his leads us to the discussion question, which seeks to establish how organizations self-organize and regenerate themselves without losing their effectiveness.... More so, we can derive another discussion question, which will address how a holographic organization distributes its capabilities, control, and intelligence for purposes of ensuring that every single unit is significant to the overall operations of an organization....
1 Pages (250 words) Assignment

Discussion Questions

These organizations are more horizontal discussion question Essay 9th July, discussion question Theory X is a style of management that assumes employees dislike their work; they avoid responsibility and needs direction, have to be controlled or threatened, need to be supervised and need to be enticed to produce work....
2 Pages (500 words) Essay

Discussion 8

hellip; Robin Evans pointed out though the depictions of people like Albrecht Durer and Grien show the witches performing utterly cannibalistic activities like collecting male penis and The Witches discussion question The first discussion started with Kelly Pang's definition about the origin of the witch stereotype.... discussion question 2The second question discussed about fair trail and how religion was used as a tool to hinder fair justice by the Church in the witch hunt....
2 Pages (500 words) Admission/Application Essay

Business Law dis #5

discussion question 3: Remedies (pg.... Krug… Krug later notified Power that the gearbox was no longer necessary when the Gulf War broke. Rule: Power Engineering cannot recover from Krug International in respect Business Law question Seller) Tom T-shirts v.... iscussion question 2: Performance and Discharge (pg....
1 Pages (250 words) Essay

Military Joint Operations

Proposed Threaded discussion question In their article titled “Responsible Drawdown: Synchronizing the Joint Vision”, Hurley and Abbatiello (2010) acknowledge that “MNC-1 logistics planners found that the core capabilities as outlined in JP 4-0 served as a comprehensive framework to develop drawdown plans” (p.... How the Question Relates to the Military Joint Issue The threaded discussion question relates to the military joint issue of responsible drawdown in the following ways: The Joint Forces course discusses in detail the core capabilities as outlined in JP 4-0 and the role of MNC-1 in facilitating military joint operations....
2 Pages (500 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us