We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Information Security - Essay Example

Comments (0)
There is a need for organisations to protect their databases because if every person can access it, then the company's competitors will have undue advantage over them. Consequently, the issue of information security arose so that organisations could protect this valuable information…
Download full paper
Information Security Essay
Read TextPreview

Extract of sample
Information Security

Download file to see previous pages... It ensures that an individuals/ group's privacy is protected/ In addition, it protects the level of availability and integrity of the information. 2
There are numerous businesses today that place most of their information in computer systems. Hospitals, the military, the governmement and many other small enterprises use them. This information could be detrimental to the company if it was accessed by the public hence the need for information security. It is quite common to find that certain businesses usually have the names of their employees, their salaries, bank account details in their computer systems. On top of this, one may find that other firms place their client details, sales information and marketing information in their database. In the event that some of this information is lost, destroyed or compromised in any way, then the given company will be hampered from going about their daily operations. 3
It should be noted that software protection through virus protection or through imposition of firewalls alone cannot be enough to solve the information security problem. There should be set procedures and systems within any one given organisation that will facilitate the process of efficient data protection. 5
Information systems are distributed in three main parts. These are; software, hardware and communications. This implies that any sort of information security systems must be applied in the three realms. It must also be made in such a way that it cuts across the physical, organisational and the personal. Procedures and policies normally used for these systems are those ones that apply to computer operators, users and administrators. It should be noted that information security applies to all types of data; it may be electronic data, print data or even other forms. Because of the wide aspect of information security, it has now become a career field on it own. Some of the professions that fall under this vast topic include Information Systems Auditing, Digital Forensics Science and Business Continuity Planning. All these professions are associated with the protection of a company's business information. 6

Why information security is a problem
In the world of technological development much needs to be done to ensure that personal information is protected. This is because there are hackers; individuals who specialise in the entry of other people's computer networks. They are usually able to achieve this through the use of appropriate hardware. When hacking occurs, then a company faces the danger of loosing all their information. This normally occurs when the hacker has placed a virus in their computer system. Alternatively, hackers can gain access into a company's computer network and give away their confidential information. This is quite an alarming issue today because it only takes a matter of seconds before something like that can be achieved. Actually, the moment a given firm shuts down their security system for just one minute, hackers may gain access and obtain so much. 7

Information security is also a big issue these days because it may also be caused by dishonest employees within the company. Some workers may connive with other outsiders to get into their company's computer ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
Information Security
Information Security. Information is certainly considered as a significant benefit in the working of any corporation. In view of the fact that the data the gather, save and distribute everyday is the extremely description of their dealings with consumers and retailers, as well as the basis for their inner operations and business procedures.
4 Pages(1000 words)Essay
Geographical Information Essay
The current hardware and software industries have been largely impacted by the advancements we have achieved in the Geographical Information technologies. The fast pace of innovations have demanded newer and faster products and applications (Industries n.d.).
5 Pages(1250 words)Essay
How to Achieve Business Information Security in Cyberspace
Universal systems have been applied to complete performance within the IT technology and provide easier measures to offer solutions to the difficult situations within the society. These systems have witnessed security breaches that have limited the performance to a minimal scale and lead to inefficient results in goal achievement.
3 Pages(750 words)Essay
Information Security Master Essay
This thesis is structured in three parts each with sub-divisions. In part 1 (2.0 -- 2.9), we survey and review Information Technology Policies and Acts of Congress, Presidential Executive Orders on IT , Office of Management and Budget (OMB) Circulars on IT.
42 Pages(10500 words)Essay
Information Security
The objective data demonstrates a couple of points quite clearly. First, as noted by Angus, the organizations that decide to implement the strictest types of security are often much less secure than companies with more balanced approaches to security; he refers to this as a U curve in which a certain level of complexity generates too many costs and complications (2005).
4 Pages(1000 words)Essay
Information Security College Essay
Passwords failed to serve the purpose because there is a tendency among individuals to keep a password that is very easy for hackers to guess, they have a habit of writing it down in easy to find places or of willingly telling people their passwords when asked.
3 Pages(750 words)Essay
Security Of Medical Records and Protected Health Information
While you may be tempted to shrug off those high-profile cases — thinking, "That couldnt happen at my facility" — the reality is tens of thousands of patient records have been compromised so far this year, according to the Privacy Rights Clearing-house, in breaches
5 Pages(1250 words)Essay
Information Technology Security
Technology is shaping our world. It has become a part of everyone’s lives and it rules almost every action of ours. However, every new development has some merits and demerits. In this essay we
15 Pages(3750 words)Essay
Information Security
Confidentiality related with any information that is personal, need to be protected and information that is uniquely identifying meaningful data. Integrity is associated with any data that loses its originality and the recipient receives amended data. Availability simply
1 Pages(250 words)Essay
Let us find you another Essay on topic Information Security Essay for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us