Nobody downloaded yet

Understanding Information Security Problems and Measures in Universities - Research Paper Example

Comments (0) Cite this document
Summary
An author of the paper "Understanding Information Security Problems and Measures in Universities" seeks to describe the importance of providing quality information security service. Therefore, the paper analyzes North Carolina Agricultural and Technical State University security plan…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.3% of users find it useful
Understanding Information Security Problems and Measures in Universities
Read TextPreview

Extract of sample "Understanding Information Security Problems and Measures in Universities"

Download file to see previous pages Effective management of security is more essential for the protection of information since information systems are at risk of threats. Such risks might occur as a result of some destruction caused to the information or the systems. Organizational employees might also be responsible and information could be hampered by some errors in their actions. Threats have the capability to lead to risks of security and if not managed or controlled, can damage the assets or information creating losses for an organization (Vacca, 2010, p.6). Thus in the present times, in regard to the factors of risks prevailing in organizations against assets and information, the significance of effective security measures can be realized. The industry working to provide the measures of security is also highly demanding as a result of the need for security. The present study focuses on the North Carolina Agricultural and Technical State University Information Security Plan and makes a critical analysis to understand how much the plan proves to be effective in its measures.
If the information security plan for the North Carolina Agricultural and Technical State University is considered, it can be observed that the university has very well made arrangements for the protection of the information and data of the students, faculty as well as the other staff members of the university. For the purpose, responsibilities are distributed across the different departments. As the plan suggests, the users, the administrators, the owners of the information and the network security have their duties mentioned in the plan (North Carolina Agricultural and Technical State University Information Security Plan, 2008, pp.1-4). ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Understanding Information Security Problems and Measures in Research Paper, n.d.)
Understanding Information Security Problems and Measures in Research Paper. Retrieved from https://studentshare.org/information-technology/1762926-security-management-authentic-assessment
(Understanding Information Security Problems and Measures in Research Paper)
Understanding Information Security Problems and Measures in Research Paper. https://studentshare.org/information-technology/1762926-security-management-authentic-assessment.
“Understanding Information Security Problems and Measures in Research Paper”, n.d. https://studentshare.org/information-technology/1762926-security-management-authentic-assessment.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Understanding Information Security Problems and Measures in Universities

Homeland Security Measures

...of state cyber criminals are becoming more coordinated and strong, which has really put the United States government in a fix. (OUR NATIONAL INFORMATION INFRASTRUCTURE; AN IMMEDIATE STRATEGIC CONCERN IN NATIONAL SECURITY POLICY) According to the author of the article, the oil and gas companies seem to be the main targets for the hackers, because of their widespread businesses, which are even established in far fledge places, where contact can be made only via satellites. As a result, it becomes easier for the cyber criminals to extract private information, without the security companies knowing about it. Furthermore, the energy sector, which includes these oil and gas...
3 Pages(750 words)Essay

Information Security

...?Fundamental Issues in Network Security Introduction Before going into the discussion regarding fundamental issues in network security, let us get a better understanding of what network security actually is and why is it important in the present world. A computer network is a collection of computers connected to each other through LANs or WANs in order to carry out different business transactions. Network security is a strategy that is used to protect computer networks from different sorts of threats by identifying the potential threats to the networks and then applying the most appropriate measures to combat the identified threats....
5 Pages(1250 words)Research Paper

Understanding information

...? ID Number Table of Contents Introduction of the Report 3 Question Shoppers’ Ratings to Different Aspects of the Fashion Show 3 Question 2: Shoppers who are Interested in Each Type of Fashion Show 5 No. of “Yes” Responses 5 Question 3: Number of Fashion Items Purchased 6 Question 5: Number of Shoppers in Each Age Group 6 Appendix 1 8 Frequency Table: Shoppers’ Ratings to Different Aspects of the Fashion Show 8 1a: QUALITY 8 1b: VARIETY 8 1c: STAGING 8 1d: MODELLING 9 1e: VIEWING 9 Appendix 2 10 Frequency Table: Shoppers Interested in Each Type of Fashion Show 10 2a: GENERAL 10 2b: WOMEN 10 2c: MEN 10 2d: CHILDREN 10 Appendix 3 11 Descriptive Statistics: Number of Fashion Items Purchased 11 Appendix 4 12 Frequency Table 3: Number... ID Number ...
3 Pages(750 words)Essay

Protecting Information through Network Security

...is the core issue. It is a general rule that is being applied all over that the first step to mitigation and eradication of problem is that of understanding it, the same applies to the menace of internet low security. In order to stand able as to address how the problem may be solved, the basic questions may be addressed that are mentioned above. Further, understanding the background and context of a particular network, and applying it according to the requirement and circumstances is another core issue that needs to be addressed. It is an established fact that where ever there is traffic there will be breach of rules and there will be infiltration, yet...
7 Pages(1750 words)Book Report/Review

Information Security

...? Information Security INFORMATION SECURITY Following the anti-virus up from McAfee that affected computers running Windows XPinternationally, the company made an official announcement, contending that a very small percentage of their clients had been affected. The apology was initially given by a spokesman for the company, and it was him who claimed that only less than 0.5% of their clients had been affected by the erroneous update (Harkins, 2013). This was the wrong person to have come out with such an apology, and it seemed that McAfee realized it. The next morning, Barry McPherson, their EVP, released a statement that was well phrased, but still unapologetic. Again,...
3 Pages(750 words)Essay

Information Security

...that are deemed acceptable (Workstation Services Support Group, 1998). This notion of acceptability is crucial to any cost-benefit analysis involving an information security system. The first step is to create a recognition that an organization's informational resources are valuable assets in need of protection. This means creating a pervasive organizational understanding about security risks, new security threats and the procedures for keeping workers informed. The second step is to draft and implement risk assessment procedures which incorporate the information security system into...
4 Pages(1000 words)Essay

Firewall Security Measures

...1a Layers 3 and 4 of OSI models uses packet filtering as a firewall security measures, with IP address in the packets, and also the ports, used to filter session that are admitted or otherwise drop. On the other hand, OSI layer 7, which is the application layer uses the packet itself as a data to filter session, and uses a application specific filtering like FTP. 1b It is a good practice that whenever we install a new system, we have to test such system in order to know if the system works seamlessly as we expect. Firewall is not exempted to this rule. We have to test firewalls in order for us to know if it really functions to protect our system from intruders. One good decision for testing a...
13 Pages(3250 words)Essay

Information Security

...Information Security Graciela Campbell MGT327 Dr Angelia Williams  September 7, Information Security (Information security components, 2009) Nagarajan (n.d) has mentioned that credit card information of 40 million customers stolen till now and BPO scams can happen anywhere in the world. Moreover he also pointed out that “European companies to splurge on BPO services “Spend on financial services` Back office, procurement& customer care to rise to $ 35 billion by 2011” (Nagarajan n.d, p.1). The above information point towards the huge dimensions of the information security related problems we are facing now. The term Information security refers to the protection of information and information systems from unauthorized access. Based... ...
6 Pages(1500 words)Term Paper

Information Security

...Information Security Table of Contents Table of Contents 2 An Overview of Information Security 3 Ensuring the Effectiveness of the Information Security Policies 3 Policies and Measures 4 Protection of the Data and the Steps Involved 5 Enhancing the Information Security 6 References 7 An Overview of Information Security The basic concept of the information security in an organization involves providing assistance to the organization’s mission. Every individual organization is open to the elements of worries which at times...
2 Pages(500 words)Essay

Security Measures Paper

...Security Recommendations for a Major Organization after Security Breached al Affiliation Security Recommendations for a MajorOrganization after Security Breached Introduction For large organizations, the attainment of security requires huge amount of time, human resources, and money. However, the huge costs involved go not mean taking chances with business network security especially given the rapidly expanding networks both commercially and government, and the developing internet economy. With these and other factors, security issue gains top priority for all companies where information technology use is...
4 Pages(1000 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Understanding Information Security Problems and Measures in Universities for FREE!

Contact Us