StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Technology- Security - Research Paper Example

Cite this document
Summary
Information assurance describes the measures that organizations take to protect and restore the quality of information in a bid to enhance the reliability of its sources. According to Herold & Rogers (2011), the concept has many dimensions that include completeness, validity,…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.2% of users find it useful
Information Technology- Security
Read Text Preview

Extract of sample "Information Technology- Security"

Information technology- Security Information technology- Security Information Assurances Information assurance describes the measures that organizations take to protect and restore the quality of information in a bid to enhance the reliability of its sources. According to Herold & Rogers (2011), the concept has many dimensions that include completeness, validity, steadfastness, timeliness, integrity and confidentiality. In organizations, the protection of information from unauthorized access and alteration is the main aim of information assurance.

As such, the appropriate use of information helps in securing organizations from risks. In the United States, records concerning the use of information indicate that the concept has been fundamental when building the required trust and reliability of the information for consumers. Consequently, the concept has enhanced the availability, integrity, authenticity, confidentiality, and non- repudiation of information as discussed in this piece. Information assurances policies and its goals, mission and objectivesAn organization defines its information assurance policy as a course of actions pursued to enable organizations to obtain information assurance security.

As such, the organizations formulate policies that describe appropriate behaviour concerning the use of information. In the contemporary society, the equipments and processes needed to meet the security requirements assist in the formulation of policies that govern the use of data in research (Herold & Rogers, 2011). Consequently, information assurance limits the risks that the misuses of information pose to organizations. Information assurance policies prioritize information based on the capacity of an organization to disseminate risks.

Lastly, the policies concerning the use of information enhance privacy in organizations. Facility management and it role in the protection of organization against threatsThe international Facility management association defines facility management as a profession encompassing multiple disciplines that enhances the functionality of the built environment. According ICISA & Park (2009), information assurance helps in making changes to the functional areas of an organization. Customer relation, time management, business continuity and financial awareness are some of the activities that are prone to information insecurities.

Therefore, organizations need to monitor their security in order to function effectively. The management should also regulate the transmission of information in its physical form. This guarantees safe storage and usage of information. According to ICISA & Park (2009), quick response to threats changes reduces risks such as obsolescence and misuse of information. The application of information assurance concept to basic security Information assurance entails the protection of information and information system by upholding their availability, authenticity, integrity, non- repudiation and confidentiality.

According to ICISA & Park (2009), the concept facilitates the restoration of information system by incorporating protection, detection and reaction capabilities. In addition, information assurance protects information from unauthorized access. Organizations use this basis in securing their information from intrusion by hackers. Successful monitoring systems only grants access to a few individual. There is a connection between security and the accessibility of information in an organization. In conclusion, the protection of information is essential to the security in organizations.

Hence, the minimization of risks is basis for the formulation of policies in organizations. Besides, organizations should protect their information at all costs because information assurance is fundamental to success in organizations. ReferencesHerold, R., & Rogers, M. K. (2011). Encyclopaedia of information assurance. Boca Raton, FL: Auerbach Publications. International Conference on Information Security and Assurance (ICISA) , & Park, J. H. (2009). Advances in information security and its application: Third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009: proceedings.

Berlin: Springer.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Technology- Security Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Information Technology- Security Research Paper Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1612653-information-technology-security
(Information Technology- Security Research Paper Example | Topics and Well Written Essays - 500 Words)
Information Technology- Security Research Paper Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1612653-information-technology-security.
“Information Technology- Security Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1612653-information-technology-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Technology- Security

Current Status of Security Awareness

It is, however, currently involved in the review of several information security awareness models for the purpose of doing just that.... hellip; th the aforementioned organizational objective in mind, this research will critically review the information security awareness construct for the purpose of potentially contributing to the design of the said model/program. Effective information security starts with the basics Therefore, perspectives and items that represent information security awareness should meet basic operational or user-level information security concerns....
4 Pages (1000 words) Essay

Information Technology Security

With the increased usage of computers and the Internet, there is a lot of movement data and personal information.... Another very common fraud is unauthorised access to information where the criminals hack into customers accounts to make changes or misuse the accounts....
15 Pages (3750 words) Essay

Digital Crime and Digital Terrorism

In those scenarios, a country's strong security apparatus will only be able to preempt those attacks, and also U.... which have faced terrorists' attacks and other security threats in the recent past have also initiated these steps.... This paper will first discuss US's government initiatives to protect its vital digital assets, then will discuss how it is crucial to protect both personal privacy as well as classified national security information, and finally will discuss how these classified assets could be breached and the safeguards that can be taken....
7 Pages (1750 words) Essay

E-Movements

Information security is generally defined as the protection of information from a wide variety of threats, such as, getting accessed by unauthorized persons, disclosed, sold or destroyed, without the consent of the owner of the information.... One of the biggest ethical issues in… To counter such unauthorized access, many laws have been passed, like Computer Fraud and Abuse Act (CFAA), which was designed in 1984, and deals with penalties for the intruders who E-Movements Question Information security is generally defined as the protection of information from a wide variety of threats, such as, gettingaccessed by unauthorized persons, disclosed, sold or destroyed, without the consent of the owner of the information....
1 Pages (250 words) Research Paper

Big Brother Big Business

Even when it comes to protecting one's information from data-mining and surveillance industries, through the information-technology security one should know that no system is foolproof.... Sometimes, it appears to play an unethical role in my life when it comes to access of my personal information and data through technology.... There is mostly possible access to my personal information is through the social websites,… It brings about the fear of unknown companies or sources tracking my behavior and keeping record of it as it may be used against me in some way (CNBC Originals Big Brother, Big Business). 2....
1 Pages (250 words) Assignment

Information Technology Security

This paper ''Information Technology security'' tells that Methodology for information ought to be controlled through a method that ensures the client access rights for Spiderweb which reflect characterized and employment prerequisites.... But this appraisal demonstrates that the utilization of single-variable verification may be insufficient, it ought to execute confirmation, layered security, or different controls sensibly figured to alleviate the hazard.... hellip; information gathering should be recognized, and access rights must be characterized and reported business needs and it should reflect the ideas of minimum benefit and isolation of obligations (SAMPEMANE 62-65)....
12 Pages (3000 words) Essay

Analysis of the Problems of XYZ Company

The problem of the company is that their Information Technology security system is not upgraded as per the market requirement, and the information is not safe.... On the basis of their criteria, the best service provider agency for IT security system will be chosen.... In order to improve the information technology security system to keep the confidential information of the company in safe hands, it is necessary that the IT security system should be strong enough....
4 Pages (1000 words) Assignment

Designing a Secure Network Infrastructure for E-Commerce

For this reason, it is important for a company to develop an information security system.... The security system does not only protect the company's data from reaching unwanted people/personnel, but it also prevents the data from being destroyed by un-trusted programs and viruses.... PrefaceOne of the aims and benefits of a masters program in information security management is the focal point on technology and issues of implementation that are related to information security....
28 Pages (7000 words) Thesis
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us