StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Role of Information Security - Thesis Example

Cite this document
Summary
The paper "The Role of Information Security" discusses that attackers normally select the weakest section of the security so that they can begin to attack from that point. Every layer of the internet model can face an attack depending on its weakness…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.5% of users find it useful
The Role of Information Security
Read Text Preview

Extract of sample "The Role of Information Security"

Information Security 1 INFORMATION SECURITY INTRODUCTION The role of computer networks as an integral part of our daily lives makes information security critical for individuals and organizations. The amount of personal and corporate information stored on networks, and the variety of threats to information, combine to form pressing need for increased protection of that information. Although this technology enables people to be more productive and allows them to access a wide range of information, it also comes with it a lot of security issues because if the information in our system is hacked the consequences can be dire indeed. Primarily, security is protection from danger. There are various types of security e.g., operation, communication and network security. While information system is made up of hardware, software, data, people, procedures and networks. According to the committee on National Security System, Information security is defined as the protection of information and its critical elements, including the system and hardware that use, store, and transit that information. It includes the broad areas of information security management, computer, data, and network security (Whitman & Mattord, 2012). There are three characteristics of information that gives it value to organization: availability, integrity and confidentiality. Therefore, these three elements have to be secured since they are vital to an organization. However the threats to the characteristics of information have evolved into a vast collection of events including accidental, intentional damage, theft, and unauthorized modification. Hence there is development of a more robust model of information security that addresses this threats ,the model consist of critical characteristics of information :availability,accuracy,authenticity , possession, integrity ,utility and confidentiality.Therefore,upper management drives a top-down and the traditional system development life cycle approach in order to implement security in organizations. Finally information security can also be described as both an art and science as it also comprises aspects of social science (Shimeall & Spring, 2014). 1.2 SECURITY FROM A GLOBAL PERSPECTIVE. Global perspective in security entails the dynamic security environment and its intrinsic challenges. It includes all the current issues in information security and how they can be managed.Idealy, there are six major aims of security and they are divided into six major categories. Table 1.1[1] There are various types of attacks that information security can come across. One of them is protocol stack, i.e fig 1.1[2] which has stratums or level and each level has a limitation. Levels like application and the representation layers are the most vulnerable to damage. Network based attack which occurs from the internet based angle has characteristics such as OS, hardware and applications, syntax, semantics and validation through hardware .Furthermore, confidentiality can be faced by the damages such as evesdropping, pocket sniffing and memory scrapping. There are also authenticity attacks which include password cracking, theft and cache poisoning among others while attacks to integrity normally involves adjustment of data. There are some kinds of attack which can cause invasion of security measures such as mutated attacks. So as to counter some of these attacks, there are measures put in place such as sharing of information that can cater for the attacks among other measures. In order for the attacker to access some of these data, the product he or she is dealing with must have vulnerability in its software code. Improperly defined memory usage within a function can be a proper example of vulnerability, whereby content can be easily sent to a specific location thus guaranteeing it to be run with privileged rights. A specially crafted code such as an exploit, can lead to vulnerability within an application or process. This exploit is known for assisting arbitrary code execution by inserting chain of bytes at a program area in the memory of a target process.Moreover; exploits normally hide in infected websites, henceforth ensnare other hosts. Apart from that, there is social engineering as another form of attack which engages manipulating individual so that they can use crafted links or visit crafted websites. In addition, the browser can be tempered with if someone visits a definite website that hosts an exploit which makes a call to download the malware. Therefore there is need to install a security that can block the exploit thus preventing the malware from being downloaded. Therefore, we are aware that vulnerability is an issue that we need to respond to, after having knowledge on the many attacks that are presently invading our software, henceforth, there is need to install security in our systems. The attack procedure and defense mechanisms employed in an” operation aurora” attack In the year 2010, google conducted operation aurora so as to demonstrate browser vulnerability. Multiple versions of internet explorer were used such as vulnerability (CVE-2010-0249).whenever an individual could visit the website containing the attack code, the download code could put into operation a heap spray technique which is known for secretly installing malicious code on the users browser. The code made it easier for the executor to access susceptive details of data. Therefore the NSS conducted a test of seven point protection products using the operation aurora attack and they found that the test worked as it blocked original payload. One of the products that they found useful was the McAfee which worked after the after mutation of the malicious payload. Attackers normally select the weakest section of the security so that they can begin to attack from that point. Every layer of the internet model can face an attack depending on its weakness. There are some attacks which can be used to attack double layers e.g. a man-in-the middle attack which is known to attack both SSL and link layer shown in fig 1.1.However ,the extended validation secure socket layer and media access control measures can be used respectively to cater for the attacks. Therefore this calls for the service provider personnel and users to be knowledgeable about defense mechanisms and take precaution all the time so as to uphold security. Finally, a set of security control that can cater for security needs for information, information systems and information infrastructure are presented in the NIST a special publication 800-53[4].Effectiveness in control and consistency are normally enabled by the security controls in the organizations. There are eighteen families of security control which comprise identification and authenticity, risk assessment, communication protection and security assessment, among others. References Shimeall, T., & Spring, J. M. (2014). Introduction to information security: A strategic-based approach. Whitman, M. E., & Mattord, H. J. (2012). Principles of information security. Boston, MA: Course Technology. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“AN INTRODUCTION TO INFORMATION AND CYBER SECURITY Thesis - 1”, n.d.)
Retrieved from https://studentshare.org/information-technology/1682246-an-introduction-to-information-and-cyber-security
(AN INTRODUCTION TO INFORMATION AND CYBER SECURITY Thesis - 1)
https://studentshare.org/information-technology/1682246-an-introduction-to-information-and-cyber-security.
“AN INTRODUCTION TO INFORMATION AND CYBER SECURITY Thesis - 1”, n.d. https://studentshare.org/information-technology/1682246-an-introduction-to-information-and-cyber-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Role of Information Security

Systems Management and Security for Wal-Mart Business

The paper "Systems Management and Security for Wal-Mart Business" states that in the current age of information technology there are lots of issues regarding information security and privacy.... However, better business information security systems include a variety of processes, expertise, safety products, and measures.... information security is becoming extremely important for all businesses.... hus, a group of systems and practices are required to be implemented to successfully discourage illegal entry and interpretation of information systems and databases (Crystal, 2011), (Anderson & Schneier, 2008) and (Grimaila, 2004)....
10 Pages (2500 words) Coursework

Cyber Threats

When some host wants to send some information to a certain host, it will send a broadcast asking who has a certain IP address.... ARP does not have a mechanism of correcting the information that it gets from the hosts which are communicating in the network (Salomon & Cassat 2003).... This is called ARP poisoning, that is the ARP table has been poisoned with wrong information.... The router will send information regarding its IP address and the MAC address thinking that the requesting agent is computer A....
5 Pages (1250 words) Assignment

Information security risk assessment and mitigation strategies development

It brings in an innovative vision about The Role of Information Security.... Though it is based on recent researches and findings in the field of information security, it brings in an innovative vision about The Role of Information Security and strategies directed on dealing with it.... This research has been mainly developed for the needs of the organizations requiring improvement of information security risk assessment and mitigation strategies....
5 Pages (1250 words) Thesis Proposal

The Role of Information Security Policy

The paper "The Role of Information Security Policy" discusses that the formation of a logical tree can be in place to show the relationship of all these policy documents of the organization hence forming a complete Information Management Policy for the organization.... This has made many organizations prioritize developing information security policies to avoid damage.... An Information Systems Security strategy ensures effective procedures as well as assists information security across the whole organization....
4 Pages (1000 words) Essay

The Role of the Information Security Officer

In the paper 'The Role of the Information Security Officer' the author looks at the field of information security, which deals with the security of information against threats like illegal access, leakage of confidential information, interference between flows of information between organizations.... Impact of information security ThreatsAccording to (Williams, 2007; Pesante, 2008; Turban et al.... 2005), there are some information security risks those can be faced by the users such as • They must be able to trust on the information which they are using....
12 Pages (3000 words) Dissertation

The Role of Information Security Policy

The author of "The Role of Information Security Policy" paper explores the various measures a company can take to safeguard its information theft and other elements.... information security is vital to a company since it stores most of its information in large servers, which have the capacity of storing large amounts of data.... information security is divided into two main categories.... IT (information security) is also referred to as computer security....
5 Pages (1250 words) Coursework

The Importance of Information Security

This research paper "The Importance of information security" discusses the problem of privacy in our everyday life.... The evolution of information security setup is triggered by the threats that are commonly faced by organizations.... However, in an attempt to define the phenomenon of information security, one can suggest a few important aspects that tend to remain vital for information security, and by analyzing the various aspects, one may reach a reasonable definition (Kissel, 2011)....
14 Pages (3500 words) Research Paper

Information Security

The regulation of information security has in recent years increased and improved drastically.... Information security needs to observe different principles of information security.... This paper ''information security'' tells that Dhillon & Backhouse stated that personal information amasses a lot of confidential information about personal interests, thoughts, education, interests, and financial status.... The information is also transmitted via networks to other electronic devices Personal information security is vital to ensure the privacy of secret information and document....
7 Pages (1750 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us