StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Technology- Security - Research Paper Example

Comments (0) Cite this document
Summary
Information assurance describes the measures that organizations take to protect and restore the quality of information in a bid to enhance the reliability of its sources. According to Herold & Rogers (2011), the concept has many dimensions that include completeness, validity,…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
Information Technology- Security
Read TextPreview

Extract of sample "Information Technology- Security"

Information technology- Security Information technology- Security Information Assurances Information assurance describes the measures that organizations take to protect and restore the quality of information in a bid to enhance the reliability of its sources. According to Herold & Rogers (2011), the concept has many dimensions that include completeness, validity, steadfastness, timeliness, integrity and confidentiality. In organizations, the protection of information from unauthorized access and alteration is the main aim of information assurance. As such, the appropriate use of information helps in securing organizations from risks. In the United States, records concerning the use of information indicate that the concept has been fundamental when building the required trust and reliability of the information for consumers. Consequently, the concept has enhanced the availability, integrity, authenticity, confidentiality, and non- repudiation of information as discussed in this piece.
Information assurances policies and its goals, mission and objectives
An organization defines its information assurance policy as a course of actions pursued to enable organizations to obtain information assurance security. As such, the organizations formulate policies that describe appropriate behaviour concerning the use of information. In the contemporary society, the equipments and processes needed to meet the security requirements assist in the formulation of policies that govern the use of data in research (Herold & Rogers, 2011). Consequently, information assurance limits the risks that the misuses of information pose to organizations. Information assurance policies prioritize information based on the capacity of an organization to disseminate risks. Lastly, the policies concerning the use of information enhance privacy in organizations.
Facility management and it role in the protection of organization against threats
The international Facility management association defines facility management as a profession encompassing multiple disciplines that enhances the functionality of the built environment. According ICISA & Park (2009), information assurance helps in making changes to the functional areas of an organization. Customer relation, time management, business continuity and financial awareness are some of the activities that are prone to information insecurities. Therefore, organizations need to monitor their security in order to function effectively. The management should also regulate the transmission of information in its physical form. This guarantees safe storage and usage of information. According to ICISA & Park (2009), quick response to threats changes reduces risks such as obsolescence and misuse of information.
The application of information assurance concept to basic security
Information assurance entails the protection of information and information system by upholding their availability, authenticity, integrity, non- repudiation and confidentiality. According to ICISA & Park (2009), the concept facilitates the restoration of information system by incorporating protection, detection and reaction capabilities. In addition, information assurance protects information from unauthorized access. Organizations use this basis in securing their information from intrusion by hackers. Successful monitoring systems only grants access to a few individual. There is a connection between security and the accessibility of information in an organization. In conclusion, the protection of information is essential to the security in organizations. Hence, the minimization of risks is basis for the formulation of policies in organizations. Besides, organizations should protect their information at all costs because information assurance is fundamental to success in organizations.

References
Herold, R., & Rogers, M. K. (2011). Encyclopaedia of information assurance. Boca Raton, FL: Auerbach Publications.
International Conference on Information Security and Assurance (ICISA) , & Park, J. H. (2009). Advances in information security and its application: Third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009: proceedings. Berlin: Springer. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Technology- Security Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Information Technology- Security Research Paper Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1612653-information-technology-security
(Information Technology- Security Research Paper Example | Topics and Well Written Essays - 500 Words)
Information Technology- Security Research Paper Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1612653-information-technology-security.
“Information Technology- Security Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1612653-information-technology-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Information Technology- Security

INFORMATION TECHNOLOGY: SURVEILLANCE SECURITY

... The report demonstrates a typical surveillance system for an organization, in order to protect the critical information assets from physical theft, unauthorized access, and natural disasters. Consideration is given to IP camera based surveillance systems, biometric systems for attendance and logging employee activity, Intrusion Detection systems for advanced security and enforcing access policies by active directory. Introduction Due to recurrent technological developments, information and communication technology frequently diverts in new dimensions. The research and development in the context of information and communication technology is very effective. Moreover, the new and advanced form of technology has also facilitated... ...
8 Pages(2000 words)Assignment

Cyber Security Information Technology Research Paper

..., it is from the nature of their positions that employees take advantage of the situation. Equally, failure of the information and communication technology department to restrict URL access may endanger the information of a given company. This is because some of the hackers are novices and only perform their functions when an opportunity is availed. In some cases, the employees may not intend to hack, but may opt to do so if they realize that some of the sites are not restricted (Hacking-Gurus, 2009). The role of the government in securing and protecting infrastructures from cyber attacks and damages Each government has a role, either direct or indirect in safeguarding...
5 Pages(1250 words)Research Paper

Technology of Information Security

...? Technology of Information Security Technology of Information Security Introduction The use of cryptography is a necessity for the consequence of the revolution of information in the world today. Electronic communications is widely used and to make conversations very confidential, cryptography gives the solution for the problem though it has been majorly spawned by a serious debate (Mel and Baker, 2000). The technique has been in existence for a long time but is not yet fully reliable thus posing a danger to all the information that is shared via the internet. Methods of encryption are on the rise because of the rapid growth in the technology sector all over the world. As technological advancement keeps coming, several reliable... ...
3 Pages(750 words)Essay

Information Technology Security

...? Information Technology and Security Introduction CIA de s confidentiality of information, integrity of information, and availability of information. Information bears significant value, especially in the contemporary business world. The protection of such information as bank account statements, credit card numbers, personal information, government documents, and trade secrets remain a critical part of information security. Confidentiality of information relates to safeguarding of information from disclosure to...
3 Pages(750 words)Essay

Information Technology Security

...Information Technology Security Submitted by: XXXXX XXXXXXX Number: XXXXXXXX of XXXXXXXX XXXXXXXX XXXXXXXXX Subject Code: XXXXXXX Date of Submission: XX – XX – 2009 Number of Words: 3892 (Excluding References) Table of Contents Table of Contents 1 Introduction: 2 What is Computer Related Crimes: 3 Types of Computer Related Crimes: 4 Conclusion: 14 References 16 In the world today where much depends upon computers and their associated networks, computer –related crime appears to becoming a major problem. Describe and analyse the range of computer related crimes and, based on this analysis, offer up some effective countermeasures. Introduction: Over the past few decades technology has grown to great heights and is still improving... that...
15 Pages(3750 words)Essay

The impact of Compliance on an organisations existing information technology security

...advantage for an organization. Introduction Organizations are feeling the heat of non-complaint behavior and process and technology issues leading to mammoth losses, both financial and organizational. Executing leadership in agreement with IT security policy and compliance is emerging as a challenge. Compliance in an organization runs through the policy planning component and automation centers (Elliot 2008). Security is an essential feature in most of the organizations today and compliance gives visibility to the processes and controls within an organization. Research Question, Objective and Scope Keeping the importance of Information Security and its...
20 Pages(5000 words)Research Paper

Information technology director security plan

...breaches to senior management staff and the HR department. If I was an information technology director, I would: Ensure the protection and management of information technology resources. Ensure access control. Write down a formal security plan with all security vulnerabilities, authorizations and the security plan. Arrange a project team which would keep a check on security. Ensure purchase and implementation of virus protection, spam-filtering software, firewalls, updates, passwords and physical security. Keep and review regular backup of data. Data should be stored on the...
1 Pages(250 words)Coursework

Technology of Information Security

...TECHNOLOGY OF INFORMATION SECURITY Technology of Information Security Affiliation At the present, the majority of business organizations use a distributed computing environment to store their data and information. In this scenario, their data and information are stored in different locations. For instance, in many cases data and information are kept on a centralized server. On the other hand, some organizations prefer to store their data in the decentralized data storage system. In this scenario, each user is individually responsible for managing and updating his own data on his own...
2 Pages(500 words)Essay

Information Technology Security

..., and overseeing access rights (SAMPEMANE 62-65). New demands for SpiderWeb will be put together by client administration to the information or framework manager for endorsement and handling. In specific cases, the task of rights may be secured by the workers part or gathering participation, and oversaw by pre-established approvals for that gathering. Sellers or builders may be allowed access, focused around their association. The data owner of SpiderWeb will review and evaluate the request based on job functions. Once approved, access will be configured by the data custodians or system administrators (Tolone et al. 29-41). The provisioning methodology ought to incorporate an effective system for...
11 Pages(2750 words)Essay

Information Technology Security Risk

...1 Evaluating Risk Analysis 1.1 Threats Threats are defined as the probable network security breach which may occur in the future and will harm the network, as well as Information systems. The current trends in technology advancement have enabled the networks to be prevalent. People are connected at home, offices, as well as when they are travelling either via laptop or mobile phones. The evaluation is conducted to identify the severity of each information system, which deserves priority due to the value of data which needs to be protected. Both threats and vulnerabilities need to be considered concurrently. Threats can provide damage to the confidentiality,...
13 Pages(3250 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Information Technology- Security for FREE!

Contact Us