We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Managing information risk and security - Essay Example

Comments (0) Cite this document
Information technology and systems have provided companies and organization such exceptional innovation in data and information management deemed essential for organizational capacity development and corporate business strategizing…
Download full paperFile format: .doc, available for editing
Polish This Essay98.1% of users find it useful
Managing information risk and security
Read TextPreview

Extract of sample
"Managing information risk and security"

Download file to see previous pages Information technology and systems have provided companies and organization such exceptional innovation in data and information management deemed essential for organizational capacity development and corporate business strategizing. However, as much as it has fared sophistication in this knowledge-based economy, organizations have likewise put up imperative measures to safeguard critical IS assets from system abuse and misuse by constantly upgrading and installing firewalls, anti-virus, use of encryption keys, protectors, use of comprehensive monitoring system, and of scaling control from access. IT-based corporation has also made it as standard policy to restrict employees from breaching organizational rules and requirements in the use of information systems and security policy (ISSP) to ascertain that their behaviours are also aligned on the need to secure company’s database. This paper will qualitatively discuss the importance of managing information risk and security using peer-reviewed journals and books from online sources. Researcher will attempt to bridge the theoretical constructs to advance the need of improving security management control to attain, prevent and protect internet systems from security threats and from cyber-criminalities. Recent research pertaining to internet study depicted information of data theft and establishment of malicious code to steal confidential information (Symantec Corporation, 2007). Most of these breached in the system were undertaken with gross negligence of employees in safekeeping the system. Computers and servers left open and accessible to those who have variant interests may make use of data base and information for negative actions. As IT has influenced business and government system in discharging their functions, the risks too doubled with the increasing number of hackers and cyber criminals. Cybercriminals refer to those web-based activities that include illegally downloading music files, stealing of millions of money from bank accounts, creating and distribution of viruses on other computers, and posting confidential information on internet, including sex videos that are illegally taped. The most modern form of cybercrime is identity theft where criminals use personal information from other users, including pictures. This is known technically as phishing and pharming (Techterms, 2013, p. 1). Criminals use others information to attract other users to fake websites appearing to be legitimate and where personal information are asked, such the use of usernames and passwords, phone numbers, addresses, credit card numbers, bank account numbers, and other information criminals can use to "steal" another person's identity (Techterms, 2013, p. 1). Many of this information are circulated on emailing system, thus, thousands are victimized and were unfortunately advantaged by those who are unscrupulous in using technology (Techterms, 2013, p. 1). Easy preys are those people with computers lacking antivirus and are bereft of spyware blocking software (Techterms, 2013, p. 1). Cases of Cybercrimes Some of the cybercrimes are also undertaken to embarrass governments due to resource-based conflicts with other nations. In effects, a number of government websites are defaced by group of hackers to embarrass the IT security management of the state and to ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Managing information risk and security Essay Example | Topics and Well Written Essays - 4250 words”, n.d.)
Retrieved from https://studentshare.org/management/1474191-managing-information-risk-and-security
(Managing Information Risk and Security Essay Example | Topics and Well Written Essays - 4250 Words)
“Managing Information Risk and Security Essay Example | Topics and Well Written Essays - 4250 Words”, n.d. https://studentshare.org/management/1474191-managing-information-risk-and-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Managing Change by Managing Risk
The research aims to get a better understanding of what change actually is. Organizational change is the reformation of a company or remodeling the roles of the employees of a company. The key to organizational change and development lies in the understanding of people's requirements and work towards it. It is also a change in overall behaviors of employee for bringing improvement in company’s productivity.
12 Pages(3000 words)Essay
Information Security
Computer simulations are generally used to improve the present state of working of an organization increasing the level of output of the work, or even newer systems may be designed that may fulfill several needs of the organization may be a lower cost than the current systems.
12 Pages(3000 words)Essay
Information Security Program Survey
As per 2011 NASA strategic plan, NASA’s mission is to “drive advances in science, technology, and exploration to enhance knowledge, education, innovation, economic vitality, and stewardship of Earth”. Safety, integrity, teamwork, and excellence are the core values of this government agency.
4 Pages(1000 words)Essay
Information Security
The apology was initially given by a spokesman for the company, and it was him who claimed that only less than 0.5% of their clients had been affected by the erroneous update (Harkins, 2013). This was the wrong person to have come out with such an apology, and it seemed that McAfee realized it.
3 Pages(750 words)Essay
Information Security
The objective data demonstrates a couple of points quite clearly. First, as noted by Angus, the organizations that decide to implement the strictest types of security are often much less secure than companies with more balanced approaches to security; he refers to this as a U curve in which a certain level of complexity generates too many costs and complications (2005).
4 Pages(1000 words)Essay
Information security legislation
Organization currently need standards, in the past many organization mostly tended to use a single information security standard for example BS 7799 part 2 (an
19 Pages(4750 words)Essay
Managing information security risks in global financial institutions
The dissertation looks forward to answer the numerous issues associated with the Information Security risk and also provide Risk management strategies that the financial institutions can implement in
60 Pages(15000 words)Essay
Risk & Security Management
That the concepts of emergency, disaster, and crisis in security and risk management are confusing and are often used interchangeably is a well-known fact. As a result, it is necessary to understand how to distinguish between these three concepts and how they must be used in the context of security & risk management.
6 Pages(1500 words)Essay
Security & Risk Management
There are many difficulties associated with making risky decisions and any wrong move can result in serious consequences for the whole organization. The need for the understanding of risk
9 Pages(2250 words)Essay
Risk and Security
It has its pros and cons. Very often this information is misused by some individuals. The information can also be leaked by means of e-mail, instant messaging, and peer-to-peer and remote access. Besides these, the usage of portable
1 Pages(250 words)Essay
Let us find you another Essay on topic Managing information risk and security for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us