We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Information Security and Ethics - Essay Example

Comments (0) Cite this document
Policies and Procedures That Organizations Should Implement to Protect Themselves Name: Institution: Course: Tutor: Date: Introduction Information about an organization and its operations provides one of the most important success factors for any firm. Private and confidential information, for instance, information about a production procedure, can be a source of competitive advantage for a company over its rivals in the market…
Download full paperFile format: .doc, available for editing
Polish This Essay94.2% of users find it useful
Information Security and Ethics
Read TextPreview

Extract of sample
"Information Security and Ethics"

Download file to see previous pages Professional ethics plays crucial role in helping information security professional to execute their duty. However, to ensure maximum information security, organizations need to institute relevant legislations to guard against information security breach. This paper explores policies and procedure that organizations should implement to secure their confidential information. It is crucial that security forms an integral part of organizational culture. Protecting the firm from possible information security breach should be a major focus of the company’s operational process. To achieve this, security policies or e-policies provide the fundamental framework for an organization to beef security over its crucial information. Security policies are regulations that outline how organizational information are supposed to be used in executing daily organizational tasks and also dictate who is authorized to access what information. What Are Security Policies or e-policies? A security policy can be referred to as a document that gives guidelines on how an organization intends to protect its physical as well as information technology assets. According to Ciampa (2010), a security policy refers to “a document that outlines the protections that should be enacted to ensure the organization’s assets face minimal risks.”An organization’s security policy is usually referred to as a living document because it is continuously upgraded to meet emerging organizational challenges in the face of organizational change and evolving employee requirements. The security policy of an organization usually reflects on policy implementation requirements and possible corrections in case loopholes are detected (Ciampa, 2010). Recommended Information Security Policies for Organizations Control over Access to Computer Rooms In order to ensure high level security for crucial organizational information, computer rooms should be kept under lock and key at all times. Computer rooms should have doors fitted strongly and manned by security officers at all times. In addition to locking computer rooms, there should be security officers deployed to man the doors to main information areas. Only authorized personnel should access such rooms through user authentication process. Use of Passwords and Authentication Procedures The organization should have documented guidelines to control access over its crucial information areas. All computers in the organization should have passwords in relation to security demands. These guidelines need to be assessed on regular intervals. The guidelines should have password requirement and control the storage of such passwords. All users of information accessing information system of the company must be authenticated. Individuals who are authorized to access company information should have unique blend of usernames and passwords to bar unauthorized personnel or external intruders from gaining easy access to the organization’s private information. Information users are held responsible for the usage of their passwords and usernames, which they should keep secret unless called upon by the chief security officer to disclose such passwords and usernames. Data Encryption Policy The second policy that an organization can establish to protect its valuable information is data encryption. In recent times, there have been numerous ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Information Security and Ethics Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Information Security and Ethics Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/management/1471765-information-security-and-ethics
(Information Security and Ethics Essay Example | Topics and Well Written Essays - 1000 Words)
Information Security and Ethics Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/management/1471765-information-security-and-ethics.
“Information Security and Ethics Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/management/1471765-information-security-and-ethics.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Currently, there are over 26 million persons affected by diabetes in the United States. Among this cohort, 18.8 million have been diagnosed while 7 million people remain undiagnosed (Center for Disease Control, 2010). Moreover, among people aged above 65 years, 10.9 million had diabetes by 2010.
3 Pages(750 words)Essay
Organizational Security
This discussion talks that the technician is always on standby to respond to queries raised by users. The IT department is tasked with the duty of providing applications for the institution. These applications are used to manage some of the activities in the institution; they include student registration and release of exam results.
5 Pages(1250 words)Essay
Security issues associated with Social Media
They are crucial communication mechanisms used to share information across a wider group of people both locally and internationally. Discussion The social networking popularity has enhanced at an amazing level. The significance of the social media sites are being used for local and professional networking, marketing, business and job searches ad crucial mechanisms to enhance revenue of sales, keep people informed of security and other associated issues and as a mechanism to reconnect with colleagues in diverse places.
3 Pages(750 words)Essay
Information security legislation
Organization currently need standards, in the past many organization mostly tended to use a single information security standard for example BS 7799 part 2 (an
19 Pages(4750 words)Essay
CASE 5 Information Security and Ethics
The people who are working internally in the organization should have that knowledge of ethics and should abide by the organization’s norms and regulation regarding the
4 Pages(1000 words)Essay
Information Security and Ethics
They also carry out their activities very rapidly. Hardware): this will require the organization to install antivirus in their computers to ensure the viruses are destroyed before they attack. The organization may also be required to back up the data in safe external
2 Pages(500 words)Essay
Information Systems Security Survey
IRS has an information security risk management program that is mainly constructed to balance the company’s security duties alongside other business duties. The company must continue with its operations despite the exposure to
3 Pages(750 words)Essay
Attack metholodgies ( network security )
mputer systems attackers and hackers were doing it for the fun of enjoying their prowess in managing to tamper and penetrate through established network security systems. However, the modern objective for computer systems and network security attacks has changed from that of fun
7 Pages(1750 words)Essay
Database security
Several laws relating to database security and privacy have been promulgated in different countries across the world. Database security entails the protection of collected information. If
1 Pages(250 words)Essay
Selling and purchasing of both new and used vehicles have been made easier. Consumers can now choose from a list of vehicles online, view prices, and place orders (Kelly & Rowland, 2000). It has also
4 Pages(1000 words)Essay
Let us find you another Essay on topic Information Security and Ethics for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us