StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Information Security Plan - Case Study Example

Comments (0) Cite this document
Summary
This paper is about the service which are the written procedures and stored in computer are exposed to risk of being stolen, corrupted and hacked. Corrective measures have to be taken by each organization to ensure that both the money-making assets of the company are protected. With the introduction of information technology, the risk of all above mentioned factors have increased…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
Information Security Plan
Read Text Preview

Extract of sample "Information Security Plan"

Download file to see previous pages Organizations are created by people, buildings and procedures, and these three ingredients can perform well only if they are assure of their security. Human Resource is exposed to external and internal environmental threats. These can include theft, suicide killers and natural calamities such as earth quakes and tsunami. Whereas, the information is the product or service produced by the company, products are stored in inventory stores and can be exposed to being stolen or destroyed by rain and other similar factors, the service which are the written procedures and stored in computer are exposed to risk of being stolen, corrupted and hacked. Corrective measures have to be taken by each organization to ensure that both the money making assets of the company are protected. With the introduction of information technology the risk of all above mentioned factors have increased. New information is continuously being added to the cyberspace. From the exchange of information for communication purpose to the exchange of secrets pertaining to the security of countries, cyberspace has become the medium of choice for everyone. (Von Solms, 2000, pp. 615-620; Von Solms, 2001, pp. 504-508; Thomson & Von Solms, 1998, pp. 167-173). Introduction of cameras on mobile phones have given access to thieves and criminals to access all the parts of the building, they can make videos and send images through internet and their web is connected all time online.
Cyberspace has become extremely complex due to the existence of an enormously complicated web of connections that prevails between governments, people and organizations (Whitman, 2003, pp. 91-95). This complexity may be related to the development of advance softwares that allow such connections to prevail and flourish with the passage of time.  ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Information Security Plan Case Study Example | Topics and Well Written Essays - 3750 words, n.d.)
Information Security Plan Case Study Example | Topics and Well Written Essays - 3750 words. https://studentshare.org/information-technology/1839661-security-plan
(Information Security Plan Case Study Example | Topics and Well Written Essays - 3750 Words)
Information Security Plan Case Study Example | Topics and Well Written Essays - 3750 Words. https://studentshare.org/information-technology/1839661-security-plan.
“Information Security Plan Case Study Example | Topics and Well Written Essays - 3750 Words”. https://studentshare.org/information-technology/1839661-security-plan.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Information Security Plan

Information Security Plan

...? Information Security Plan October 9, Information Security Plan INTRODUCTION: Computer audit entails safeguarding the company’s holdings. The research delves on the information security risks. The research delves on the on implementing programmes that will reduce or eliminate information security threats in an Australian company setting. Information Security Plan’s safeguarding of company assets policy ensures the Australian company’s business continuity. BODY: a) Identification and description of the organisation’s physical holdings (property) that may be at risk As recently appointed head of a security team that is responsible for protecting the information holdings of a business organisation of some 60 staff, the head current task...
12 Pages (3000 words) Research Paper

Security Plan for ABC Information Systems

...Information Security Plan... Information Security Plan... Security Plan for ABC Information Systems No. of words Unit number: Study Period: DECLARATION This project is an original one and not a duplicate from a different system. No duplication or any reproduction of this security plan information system document should be done without permission from the author. Candidate…………………………… Supervisor………………………….. Sign…………………………………. Date………………………………. Table of Contents Title Page……………………………………………………………………..1 Declaration……………………………………………………………………2 Introduction…………………………………………………………………...5 Background information of ABC……………………………………………..5 System Environment…………………………………………………………..7 Objectives of the security plan………………………………………………...7...
15 Pages (3750 words) Research Paper

Information Security

...Information Security Plan... Information Security Plan... Issues in Network Security Introduction Before going into the discussion regarding fundamental issues in network security, let us get a better understanding of what network security actually is and why is it important in the present world. A computer network is a collection of computers connected to each other through LANs or WANs in order to carry out different business transactions. Network security is a strategy that is used to protect computer networks from different sorts of threats by identifying the potential threats to the networks and then applying the most appropriate measures to combat the identified threats. Network security is one of the most important concerns for any company ...
5 Pages (1250 words) Research Paper

Information Security

...Information Security Plan... Information Security Plan... SECURITY Information security Affiliation Table of Contents Table of Contents 2 SLP Information Security Management: Frameworks & Principles 3 Security Issue 3 SLP 2: Belief & Culture: Build Awareness 5 SLP 3: Politics & Legislation 7 SLP 4: Economics: Cost/benefit & Incentive Design 10 SLP 5: Security via Technology 11 Passwords Technology 12 Firewall Technology 12 Encryption Technology 13 References 13 SLP# 1: Information Security Management: Frameworks & Principles It is an admitted fact that information is extensively shared in almost all the business communication processes amongst associates, workers, clients, and other stakeholders. In this scenario, the technical potentials of the...
10 Pages (2500 words) Essay

Information Security

...Information Security Plan... Information Security Plan... Information Security INFORMATION SECURITY Following the anti-virus up from McAfee that affected computers running Windows XPinternationally, the company made an official announcement, contending that a very small percentage of their clients had been affected. The apology was initially given by a spokesman for the company, and it was him who claimed that only less than 0.5% of their clients had been affected by the erroneous update (Harkins, 2013). This was the wrong person to have come out with such an apology, and it seemed that McAfee realized it. The next morning, Barry McPherson, their EVP, released a statement that was well phrased, but still unapologetic. Again, this was the wrong...
3 Pages (750 words) Essay

Information Security

...Information Security Plan... Information Security Plan... Security: Balance and Management Introduction Determining an appropriate level of information security is often complicated by the factthat different professionals, be they general managers or IT specialists, often perceive security needs through a different set of priorities. Security specialists often see complexity and increasingly secure systems as a desirable business practice (Angus, 2007; Miller, 2005) whereas general managers are more likely to view information security practices within a larger business context. The objective data demonstrates a couple of points quite clearly. First, as noted by Angus, the organizations that decide to implement the strictest types of security...
4 Pages (1000 words) Essay

Information Security

...Information Security Plan... Information Security Plan... Security Graciela Campbell MGT327 Dr Angelia Williams  September 7, Information Security (Information security components, 2009) Nagarajan (n.d) has mentioned that credit card information of 40 million customers stolen till now and BPO scams can happen anywhere in the world. Moreover he also pointed out that “European companies to splurge on BPO services “Spend on financial services` Back office, procurement& customer care to rise to $ 35 billion by 2011” (Nagarajan n.d, p.1). The above information point towards the huge dimensions of the information security related problems we are facing now. The term Information security refers to the protection of information and information systems fro...
6 Pages (1500 words) Term Paper

Information Security

...Information Security Plan... Information Security Plan... Security Table of Contents Table of Contents 2 An Overview of Information Security 3 Ensuring the Effectiveness of the Information Security Policies 3 Policies and Measures 4 Protection of the Data and the Steps Involved 5 Enhancing the Information Security 6 References 7 An Overview of Information Security The basic concept of the information security in an organization involves providing assistance to the organization’s mission. Every individual organization is open to the elements of worries which at times can influence the organization adversely (Elky, 2006). At this instance, the discussion will be based on the importance of information security of a healthcare organization named OUMC ...
2 Pages (500 words) Essay

Information technology director security plan

...Information Security Plan... Information Security Plan... Plan Security is not primarily a technical or technological issue but is a management issue as the incidents of lax security and bank failures due to redundancies and other management errors have increased. For instance, even if a company has implemented a classy application to manage customers’ identities, management failure to follow on-board and off-board employees may lead to many backdoor security threats. The continuous redundancies are another threat that arises from poor management and endangers banks and other financial institutions. Another example is that poor management of data access control, when the authorized person loses authorization, can lead to data insecurity. Security ...
1 Pages (250 words) Coursework

Security Plan- Human, Electronic Information

...Information Security Plan... Information Security Plan... With greater automation of business processes, the potential threats to the organization’s physical, human and electronic information holdings have also increased multi fold. To focus on threats to electronic information holdings first, there is no doubt that the frequency of computer related fraud and crime had grown in the past few years. One of the rampant and challenging problems is surreptitious access to an organization’s strategic information, upon which its competitive advantages lie. The particular threats vary slightly depending on the industrial sector of the organization. To take the example of digital media industry, the following observation by Craig Kuhl, points out th...
17 Pages (4250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Information Security Plan for FREE!

Contact Us