StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information securtiy - Essay Example

Cite this document
Summary
The report is divided into two parts explicitly. First part deals with a general discussion about information security. An introduction is given as to what information security…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Information securtiy
Read Text Preview

Extract of sample "Information securtiy"

Download file to see previous pages

Some lines have dedicated to explain the ISO/IEC 17799:2005 standard of information security policy. The second part of the report deals with a field-specific discussion. In this part, information security in the field of computers and internet has been explained. Threats posed to the sensitive information stored on computers have been discussed along with procedures for their determent. Some laws and Acts have been explained that ensure the information security in the new technological world.

Information security is generally defined as the protection of information from a wide variety of threats, such as, getting accessed by unauthorized persons, disclosed, sold or destroyed, without the consent of the owner of the information. Thus, the primary objectives of information security are to ensure the privacy, reliability and accessibility of information. Information security is becoming one of the most important concerns in almost every profession and every field of life. Information security is a business issue, not just a technology issue (Symantec Corporation 2009).

Sensitive information about the consumers and employees, finances, inventories, payments, research work, is being maintained by governments, organizations, companies, banks, armed forces, healthcare sectors, so on and so forth. This corporate information is the most crucial asset of a company and is at stake if proper measures are not taken to deter the security attacks. The information may have been stored in any form. For example, it may be in printed form; stored in files and documents; saved on the computers’ hard disks; shown on video tapes; and, transmitted by post, email or any other physical or electronic means.

Breaches in information security can result in great losses and damages to the overall business and may lead to business discontinuity, high risks and low output. Most of

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information securtiy Essay Example | Topics and Well Written Essays - 3000 words”, n.d.)
Information securtiy Essay Example | Topics and Well Written Essays - 3000 words. Retrieved from https://studentshare.org/miscellaneous/1561029-information-securtiy
(Information Securtiy Essay Example | Topics and Well Written Essays - 3000 Words)
Information Securtiy Essay Example | Topics and Well Written Essays - 3000 Words. https://studentshare.org/miscellaneous/1561029-information-securtiy.
“Information Securtiy Essay Example | Topics and Well Written Essays - 3000 Words”, n.d. https://studentshare.org/miscellaneous/1561029-information-securtiy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information securtiy

Information Security

Title: Need for information Security 1.... hellip; The increasing competition makes it vital for all types of organizations to be equipped with information and data about their customers, market trends, consumer behavior etc.... However, the possession of complete information is considered to be an incomplete victory if it is not protected in an effective manner against prevailing threats and vulnerabilities.... Lack of awareness and execution to protect company's information assets can result in loss of revenues, bad reputation for the company and probable law suits by the customers for not being able to protect their data....
3 Pages (750 words) Research Paper

Information Security

information Security in Small Business Firms (Name) (University) information Security in Small Business Firms Introduction The explosive growth of internet has added to the efficiency and convenience of modern business operations.... However, a wide variety of information security threats, particularly computer hacking raises potential challenges to keeping and transferring information securely over the internet.... hellip; Even a small business organization needs to deal with huge volume of confidential and sensitive information....
3 Pages (750 words) Research Proposal

Information Security

Determining an appropriate level of information security is often complicated by the fact that different professionals, be they general managers or IT specialists, often perceive security needs through a different set of priorities.... Security specialists often see complexity and increasingly secure systems as a desirable business practice (Angus, 2007; Miller, 2005) whereas general managers are more likely to view information security practices within a larger business context....
4 Pages (1000 words) Essay

The Necessity of Information Security in Modern Organizations

Moreover he also pointed out that “European companies to splurge on BPO services “Spend on financial services' Back office,… The above information point towards the huge dimensions of the information security related problems we are facing now.... The term information security refers to the protection of information and Based on the nature of the information, we can classify information into two board categories; private and public....
4 Pages (1000 words) Term Paper

Information Security

At this… The organization deals with healthcare so, because of its nature of work it needs to store a lot of information regarding healthcare, finance and similar other information Security Table of Contents Table of Contents 2 An Overview of information Security 3 Ensuring the Effectiveness of the information Security Policies 3Policies and Measures 4Protection of the Data and the Steps Involved 5Enhancing the information Security 6References 7An Overview of information SecurityThe basic concept of the information security in an organization involves providing assistance to the organization's mission....
2 Pages (500 words) Essay

Information Security

Likewise, they often miss the concept of addressing information security holistically.... information security has three pillars i.... Confidentiality, Integrity and… Confidentiality related with any information that is personal, need to be protected and information that is uniquely identifying meaningful data.... Availability simply of the of the 12 December information Security information security is a misunderstood concept, as some organizations relate it to the technical excellence....
1 Pages (250 words) Essay

Information Security of HoloStealers Pty Ltd and Smooth Electronics Inc

In order to acquire the required information about business competitors, marketing information systems are some of the most powerful tools that can be used.... Such forums can be used to collect information about products and services being produced by other business organizations.... arketing information systems can be used to collect all forms of business intelligence from global databases, social networking sites, blogs, corporate sits and other authoritative sources (Suidan, 1994)....
24 Pages (6000 words) Essay

Tools Used in Tightening Information Security

information SecurityIntroductionInformation security refers to the maintenance of privacy and integrity within the storage and transmission of information.... Anytime unauthorized user accesses any kind of organizational information, the organizational information SecurityIntroductionInformation security refers to the maintenance of privacy and integrity within the storage and transmission of information....
13 Pages (3250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us