StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Security - Essay Example

Cite this document
Summary
Likewise, they often miss the concept of addressing information security holistically. Information security has three pillars i.e. Confidentiality, Integrity and…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Information Security
Read Text Preview

Extract of sample "Information Security"

of the of the 12 December Information Security Information security is a misunderstood concept, as some organizations relate it to the technical excellence. Likewise, they often miss the concept of addressing information security holistically. Information security has three pillars i.e. Confidentiality, Integrity and Availability. Confidentiality related with any information that is personal, need to be protected and information that is uniquely identifying meaningful data. Integrity is associated with any data that loses its originality and the recipient receives amended data.

Availability simply related to non-availability of data when it is required. Examples for these three pillars are:Confidentiality: personal information, mission critical information exposedIntegrity: Original email is amended and the recipient do not knowAvailability: Email is required to fulfill a task and it is not available.For minimizing the threats to information security, a continuous cycle comprising of process, people and technology is required. Likewise, the processes will be made for effecting handling information security practices both for technical and management domain.

People need to be aware of threats associated with information security. For establishing awareness, a continuous information security awareness program is required that will aware all employees of the organization for associated risks and current threats. Furthermore, the technology part will also play a critical role as technical controls can be implemented via technology. These practices will help us achieve risk mitigation on critical assets at an acceptable level and they can be transferred, mitigated and avoided.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Security Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1625049-information-security
(Information Security Essay Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/information-technology/1625049-information-security.
“Information Security Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1625049-information-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security

Summarizing how information security

Summarizing How Information Security Overview Information is considered to be one of the major elements with regard to a business as it is believed to entail various details regarding the varied operations of an organization.... hellip; Therefore, Information Security is considered to be one of the most imperative aspects for the modern organizations in order to safeguard their business information.... This paper intends to briefly discuss about Information Security system of Citibank and the way it protects the information related to its clients as well as their valuable assets which facilitate the organization to build trust within their clients....
3 Pages (750 words) Essay

Common Information Security Threats

Common Information Security Threats Introduction The purpose of computers and other network systems is to facilitate information exchange; today, organizations are managed using computer network.... At the present, organizations face a number of security threats (Whitman, 2003), this paper explores the Information Security threats facing Apple Inc.... Information Security threats According to Grimes (2012), the threats in terms of Information Security faced by Apple Inc include: The threat on data Attackers today have invented mechanism to alter data, this involves the data the company utilizes internally....
3 Pages (750 words) Essay

Information Security Planning

The essay “Information Security Planning” focuses on Information Security, which is about taking care of business continuity which involves media backup operation, monitoring of incidents, classifying information and suitably providing access to this information to members of the company.... hellip; The author states that Information Security is an ongoing process that would necessarily require planning and execution.... The Information Security should be compliant to IS 17799 standards....
2 Pages (500 words) Essay

Information Security of Business

nbsp; Information Security essentially requires that the genuine parties to a transaction are identified, the actions they are allowed to perform are determined and their actions are limited to only those that are necessary to initiate and complete the transaction.... nbsp;… This is the age of information technology and the information is one thing that is going to transfer while conducting businesses, no matter what and with information comes the issue of security....
3 Pages (750 words) Term Paper

Principles of Information Security

The paper entitled "Principles of Information Security" aims to analyze the problem faced by the Assessment Office and provide control recommendations.... security program plan is made when all the controls are identified.... The various controls that are identified are Identity Card, Backup procedures, Training/Awareness, Strictly Comply ITS security policies, Physical Protection of Server (CPU), and Proper Rechecking etc.... According to the text, information systems deal with various types of risks/threats, thus, the threat may be accidental, internal or from external sources....
10 Pages (2500 words) Essay

Information Security Proposal

Also the privacy issues of the… Being mobile phone users it is essential for us to understand how the company deals with the Information Security and the measures that are in place for the IT disaster recovery plan as Information Security Proposal Aim and Objectives of Project: To identify the issue faced by mobile phone network providers in regards to the privacy issues and the network downtime issues.... Justification of the Project:Information Security issues within firms are many....
2 Pages (500 words) Essay

Technology of Information Security

However, the most commonly used scenarios TECHNOLOGY OF Information Security Technology of Information Security Affiliation At the present, the majority of business organizations use a distributed computing environment to store their data and information.... I have presented below three Information Security technologies:1.... EncryptionSecond Information Security technology that I have chosen is the encryption technology.... In addition, all of the above discussed situations come with a variety of security problems to consider....
2 Pages (500 words) Essay

Controls for Information Security

The present essay entitled "Controls for Information Security" concerns the way of controlling Information Security.... According to Romney, Information Security affects information systems reliability by ensuring that malicious threats do not cause downtime.... hellip; Users require accurate data that the Information Security must protect from loss or theft by third parties.... The other way that Information Security affects information systems reliability is the protection against data failure....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us