Nobody downloaded yet

Information Security - Essay Example

Comments (0) Cite this document
There is a need for organisations to protect their databases because if every person can access it, then the company's competitors will have undue advantage over them. Consequently, the issue of information security arose so that organisations could protect this valuable information…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Information Security Essay
Read TextPreview

Extract of sample
"Information Security"

Download file to see previous pages It ensures that an individuals/ group's privacy is protected/ In addition, it protects the level of availability and integrity of the information. 2
There are numerous businesses today that place most of their information in computer systems. Hospitals, the military, the governmement and many other small enterprises use them. This information could be detrimental to the company if it was accessed by the public hence the need for information security. It is quite common to find that certain businesses usually have the names of their employees, their salaries, bank account details in their computer systems. On top of this, one may find that other firms place their client details, sales information and marketing information in their database. In the event that some of this information is lost, destroyed or compromised in any way, then the given company will be hampered from going about their daily operations. 3
It should be noted that software protection through virus protection or through imposition of firewalls alone cannot be enough to solve the information security problem. There should be set procedures and systems within any one given organisation that will facilitate the process of efficient data protection. 5
Information systems are distributed in three main parts. These are; software, hardware and communications. This implies that any sort of information security systems must be applied in the three realms. It must also be made in such a way that it cuts across the physical, organisational and the personal. Procedures and policies normally used for these systems are those ones that apply to computer operators, users and administrators. It should be noted that information security applies to all types of data; it may be electronic data, print data or even other forms. Because of the wide aspect of information security, it has now become a career field on it own. Some of the professions that fall under this vast topic include Information Systems Auditing, Digital Forensics Science and Business Continuity Planning. All these professions are associated with the protection of a company's business information. 6

Why information security is a problem
In the world of technological development much needs to be done to ensure that personal information is protected. This is because there are hackers; individuals who specialise in the entry of other people's computer networks. They are usually able to achieve this through the use of appropriate hardware. When hacking occurs, then a company faces the danger of loosing all their information. This normally occurs when the hacker has placed a virus in their computer system. Alternatively, hackers can gain access into a company's computer network and give away their confidential information. This is quite an alarming issue today because it only takes a matter of seconds before something like that can be achieved. Actually, the moment a given firm shuts down their security system for just one minute, hackers may gain access and obtain so much. 7

Information security is also a big issue these days because it may also be caused by dishonest employees within the company. Some workers may connive with other outsiders to get into their company's computer ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Information Security Essay Example | Topics and Well Written Essays - 5000 words”, n.d.)
Retrieved from
(Information Security Essay Example | Topics and Well Written Essays - 5000 Words)
“Information Security Essay Example | Topics and Well Written Essays - 5000 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Information Security
... Information Security Introduction: Computer simulation techniques enable the designing of a model of a real system, such that the model is implemented as a computer program. Organizational changes can be clearly understood through such simulation techniques such that an organization becomes capable of deciding on the measures that are needed to be considered in order to manage such changes. Computer simulations are generally used to improve the present state of working of an organization increasing the level of output of the work, or even newer systems may be designed that may fulfill several needs of the organization may be a lower cost than the current systems. However the use of computer simulations has certain disadvantages... and it is...
12 Pages(3000 words)Essay
Information Security Plan
...? Information Security Plan October 9, Information Security Plan INTRODUCTION: Computer audit entails safeguarding the company’s holdings. The research delves on the information security risks. The research delves on the on implementing programmes that will reduce or eliminate information security threats in an Australian company setting. Information Security Plan’s safeguarding of company assets policy ensures the Australian company’s business continuity. BODY: a) Identification and description of the organisation’s physical holdings (property) that may be at risk As...
12 Pages(3000 words)Essay
Information Security
...?INFORMATION SECURITY Information Security Affiliation Information is certainly considered as a significant benefit in the workingof any corporation. In view of the fact that the data the gather, save and distribute everyday is the extremely description of their dealings with consumers and retailers, as well as the basis for their inner operations and business procedures. Thus, saving it is as significant as caring their currency and other physical resource as well as necessitates just as a great deal of protection and arrangement (Motorolla, 2010). As information has turned out to be the most valuable resource for any business and extremely important for business in such scenario where an organization needs to take a great care... , the...
4 Pages(1000 words)Essay
Information Security
...?INFORMATION SECURITY Information security Affiliation Table of Contents Table of Contents 2 SLP Information Security Management: Frameworks & Principles 3 Security Issue 3 SLP 2: Belief & Culture: Build Awareness 5 SLP 3: Politics & Legislation 7 SLP 4: Economics: Cost/benefit & Incentive Design 10 SLP 5: Security via Technology 11 Passwords Technology 12 Firewall Technology 12 Encryption Technology 13 References 13 SLP# 1: Information Security Management: Frameworks & Principles It is an admitted fact that information is extensively shared in almost all...
10 Pages(2500 words)Essay
Information Security
...? Information Security INFORMATION SECURITY Following the anti-virus up from McAfee that affected computers running Windows XPinternationally, the company made an official announcement, contending that a very small percentage of their clients had been affected. The apology was initially given by a spokesman for the company, and it was him who claimed that only less than 0.5% of their clients had been affected by the erroneous update (Harkins, 2013). This was the wrong person to have come out with such an apology, and it seemed that McAfee realized it. The next morning, Barry McPherson, their EVP, released a statement that was well phrased, but still unapologetic. Again,...
3 Pages(750 words)Essay
Information security
...? INFORMATION SECURITY here] of [Due paper] Answer Part Universal Plug and Play (UPnP) and its Weaknesses Introduction Before discussing the technical security issues associated with universal plug and play devices, let us get a better understanding of what these devices actually are. Universal Plug and Play (UPnP) refers to a protocol standard that enables communication between network-enabled devices and computer systems. Some of the main devices in which universal plug and play devices are used include printers, media servers, routers, digital video recorders (DVRs), computers, and even security cameras (Vaughan-Nichols 2013). Although this protocol allows devices to...
12 Pages(3000 words)Essay
Information Security
...Information Security: Balance and Management Introduction Determining an appropriate level of information security is often complicated by the factthat different professionals, be they general managers or IT specialists, often perceive security needs through a different set of priorities. Security specialists often see complexity and increasingly secure systems as a desirable business practice (Angus, 2007; Miller, 2005) whereas general managers are more likely to view information security practices within a larger business context. The objective data demonstrates a couple of points quite clearly. First, as noted by Angus, the organizations that decide to implement the strictest types of security are often much less secure than... ...
4 Pages(1000 words)Essay
Information Security
...Information Security Table of Contents Table of Contents 2 An Overview of Information Security 3 Ensuring the Effectiveness of the Information Security Policies 3 Policies and Measures 4 Protection of the Data and the Steps Involved 5 Enhancing the Information Security 6 References 7 An Overview of Information Security The basic concept of the information security in an organization involves providing assistance to the organization’s mission. Every individual organization is open to the elements of worries which at times can influence the...
2 Pages(500 words)Essay
Information Security
...of qualitative design should not be confined to such functions alone. In fact, some investigators use it to strengthen and compliment the information from quantitative data and can even allow researches to forumulate various hypotheses. Hence, real utility of qualitative study design occurs in a gamut of functions. In fact, the delineation between quantitative and qualitative approaches may sometimes become in distinct. Again, in the context of information security, numeric data can be presented in a qualitative manner. In other words, quantitative data can be transformed to something that are descriptive in nature. For instance, a certain range of values will signifiy medium, low, or...
15 Pages(3750 words)Essay
Information Security
...of the of the 12 December Information Security Information security is a misunderstood concept, as some organizations relate it to the technical excellence. Likewise, they often miss the concept of addressing information security holistically. Information security has three pillars i.e. Confidentiality, Integrity and Availability. Confidentiality related with any information that is personal, need to be protected and information that is uniquely identifying meaningful data. Integrity is associated with any data that loses its originality and the recipient receives...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Information Security Essay for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us