Comments (0) Cite this document
The amount of personal and corporate information stored on networks, and the variety of threats to information, combine to form pressing…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
Read TextPreview


Download file to see previous pages Primarily, security is protection from danger. There are various types of security e.g., operation, communication and network security. While information system is made up of hardware, software, data, people, procedures and networks. According to the committee on National Security System, Information security is defined as the protection of information and its critical elements, including the system and hardware that use, store, and transit that information. It includes the broad areas of information security management, computer, data, and network security (Whitman & Mattord, 2012). There are three characteristics of information that gives it value to organization: availability, integrity and confidentiality. Therefore, these three elements have to be secured since they are vital to an organization. However the threats to the characteristics of information have evolved into a vast collection of events including accidental, intentional damage, theft, and unauthorized modification. Hence there is development of a more robust model of information security that addresses this threats ,the model consist of critical characteristics of information :availability,accuracy,authenticity , possession, integrity ,utility and confidentiality.Therefore,upper management drives a top-down and the traditional system development life cycle approach in order to implement security in organizations. Finally information security can also be described as both an art and science as it also comprises aspects of social science (Shimeall & Spring, 2014).
Global perspective in security entails the dynamic security environment and its intrinsic challenges. It includes all the current issues in information security and how they can be managed.Idealy, there are six major aims of security and they are divided into six major categories. Table 1.1[1]
There are various types of attacks that information security can come across. One of them is protocol stack, i.e fig 1.1[2] ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
Retrieved from
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Cyber Security

...? Cyber security 02-02 Cyber security According to, anything that is at a risk of emotional or physical grievance is vulnerable. Talking about cyber security, vulnerability is a security weakness; anything that can be harmed easily or destroyed effortlessly is said to be ‘vulnerable’. Every now and then new programs are developed and information technology managers are harassed by hackers as their systems are always vulnerable to external threats. In the current age of union of communication and technology, one cannot resist or keep away from being affected by internet,...
10 Pages(2500 words)Coursework

Information warfare and cyber security

...and computers within the military arena has given rise to various force multipliers like Network Centric Warfare, Information Operations, and the C4I2SR Systems, and this age of information warfare and cyber terrorism often referred to as Revolution in Military Affairs (RMA), has not only changed the way modern wars are fought, but have also opened a new perspective in the domination of a new arena, the cyber space. This paper will take an in-depth look into the sphere of information warfare. Information warfare and cyber security 1 Introduction “One hundred victories in one hundred...
40 Pages(10000 words)Research Paper

Cyber Security and Information Security

...?Textbook: Management of Information Security by Whitman and Mattord Chapter 2 P. 70 Using a web search engine, find an article from a reputable source published within the past six months that reports on the relative risk that comes from inside the organization as opposed to risk that comes from external sources. If the article notes that this relative risk is changing and to what does the article attribute the change? Phneah (2013) reports on how organizational risk coming from inside sources is currently evolving and insiders that pose a risk are working in different and more complex ways. For example, Phneah (2013) suggests that previously, risks from inside the company were previously more about...
4 Pages(1000 words)Assignment

Cyber security

...CYBER SECURITY Cyber Security E-government comes at a cost. Is there a trade-off that occurs between the security of federal systems and the cost savings from reduced paperwork? I concur with the response given to the question since it has fully explored the benefits and setbacks of e-government against the benefits of manual storage of information. The answer has outlined the gains the government enjoys for employing technology to store its information. It has clearly shown that substantial amounts of money can be saved in terms of money invested in storage space. This is a true reflection of what takes place when...
2 Pages(500 words)Coursework

Cyber security

...Cyber Security Cyber Security Affiliation If someone asked you for advice on what he or she should do first to get started onIntrusion Detection, what would you recommend? If someone asks me for advice on what he or she should do first to get started on intrusion detection then I would suggest him to think about what advantages or opportunities he expects from the deal he is going to make. In this scenario, one excellent starting point can be from looking at the impact of previous intrusions (Bloedorn, Christiansen, Hill, Skorupka, Talbot, & Tivel, 2002). However, if he or she has been caused to experience intrusions and hacking act before, they will be acquainted with...
1 Pages(250 words)Coursework

Cyber Security

...Insert Introduction The world today is more interconnected than ever before. As many people become more dependent on modern technology, there has equally been an emergence of vulnerability to cyber attack such as security breaches, spear phishing and social media fraud. With all its advantages, increased connectivity means increased risk incidences involving theft, abuse and fraud. Ensuring cyber security is the role of every individual as it’s everyone’s duty to ensure it is safer, more secure and resilient (Marshall, 67). Cyber security refers to the body of technologies, processes and practices...
1 Pages(250 words)Essay

Cyber Security a generic term covering the multiplicity of crimes found in penal codes or in legislation having the use of computers as a center component (Girasa, 2002). Cybercrime can be analyzed in a narrow and broad sense. Narrowly, it can be defined as an illegal activity related to computer and computer aided services. Broadly, it refers to an illegal work, which can be committed by means relating to computers or any kind of network system. The concept of cyber security in modern world can be discussed in light of increasing cyber threat. Cyber security can be defined as a system which is used by the government and various organizations to protect...
10 Pages(2500 words)Term Paper

Cyber Security

...Cyber Security Cyber Security There is a pressing need for organization’s antivirus policy to specify that anti-virus be configuredin a way that they quarantine files infected with viruses rather than automatically deleting them. Deleting the infected files often lead to non-functioning of the application or operating system, an aspect that can temporarily paralyze operations of a business. This would automatically result into losses, especially if the problem is serious (Mishra, 2013). Experts suggest deleting the infected files as the worst option an antivirus can resort to. Furthermore, some antivirus applications identify certain types of files as infected while...
1 Pages(250 words)Essay

AN INTRODUCTION TO INFORMATION AND CYBER SECURITY deliver. Although the common criterion is not flawless, as at the initial level, security objectives and protection profiles possess the same weakness similar to the Information Technology Security Evaluation Criteria (ITSEC) (Matt, 2006). The evaluation methodology of Trusted Computer System Evaluation Criteria (TCSEC) has two fundamental issues. The first issue was “criteria creep” or the gradual expansion of necessities that illustrates the evaluation classes for TCSEC (Matt, 2006). The findings of the evaluation highlighted the interpretation of the criteria for applying it to specific products, instead of publishing regular revisions for addressing the interpreted requirements....
10 Pages(2500 words)Thesis

Success in Second Language Learning: Theory and Process

7 Pages(1750 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Thesis on topic AN INTRODUCTION TO INFORMATION AND CYBER SECURITY for FREE!

Contact Us