We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

IT and IS Security - Essay Example

Comments (0)
IT/IS Security has recently become a major concern given that the use of information systems has rocketed. For instance, most processes and procedures can now be completed online; wireless and mobile broadband is also increasing in use; as is the adoption of information technology…
Download full paper
IT and IS Security
Read TextPreview

Extract of sample
IT and IS Security

Download file to see previous pages... The same can be said for mobile phones and digital storage media, where mobile phones are more than just a calling device, but also function as personal digital assistants with access to the internet and related applications. Likewise, storage media has progressed from floppy discs and compact discs, to USB or flash drives that can be attached to key rings.
Van Loggerenberg and Morne (2008) have also stated that our increased use of computers and digital media has increased our dependency on the proper functioning of such devices. This means that as more processes and procedures are carried out using IT/IS systems, we, as users lose our ability to deal with and possibly identify the vulnerabilities associated with these systems. Another possible reason suggested by Van Loggerenberg and Morne (2008) is that we place our trust in these systems, and this demonstrated by the existence of extensive internal intranet and online systems which business and personal users access to send highly sensitive information. It seems that there is a common belief that the systems are safe, and that they cannot be intercepted by any other third parties. However, this unwavering trust is also a potential source of the vulnerabilities that shall be discussed in this report.
Vulnerabilities associated with IT/IS security is therefore focussed on the trus...
The development of IT/IS was instrumental in widening the access to knowledge for many individuals, however, this access to knowledge has also proved to be a double-edge sword. For instance, those with the most knowledge on the workings of IT/IS systems are more likely use this knowledge to exploit the vulnerabilities that so many users are unaware of. Therefore the main aim of this report is to introduce and highlight the main vulnerabilities associated with IT/IS security; which will be achieved by examining the meaning of IT/IS, its security and the management of these vulnerabilities.
IT and IS security
IT/IS security can be defined as "the application of the principles, policies and procedures necessary to ensure the confidentiality, integrity, availability, and privacy of data in all forms of media (electronic and hardcopy) throughout the data lifecycle" (USDHS 2007). This means that IT/IS security is highly dependent on how the principles, policies and procedures are applied within organisations and to individuals. Whilst most organisations will have these in place to protect the broader spectrum of information and data, the application of security can be somewhat difficult when applied to individuals. For example, there have been numerous cases of business laptops going missing or being stolen, or individuals losing their USB or flash sticks which contain very important information. It seems the application of security in these instances is either unknown by individuals or the effect of such vulnerabilities is hugely underestimated.
For instance, large organisations fully understand the need for data authentication and privilege systems to protect their systems (USDHS 2007) and as such they pay attention to such systems in order to protect sensitive ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
Digital Security
Digital security comprises of tools that an individual or user uses in securing his or her identity, technology and assets in the mobile and online world. These tools might be in the form of biometrics, web services, anti-virus software and secure personal devices that people carry with them every day.
8 Pages(2000 words)Essay
There is a greater need to realize a stronger user security and device identification and limit much of the insecurity. The paper identifies some of the common security threats that face people online. However, it is realized that while people are reactive about aspects of online security, they only invest slightly to reduce this risk.
4 Pages(1000 words)Essay
Information Security
The objective data demonstrates a couple of points quite clearly. First, as noted by Angus, the organizations that decide to implement the strictest types of security are often much less secure than companies with more balanced approaches to security; he refers to this as a U curve in which a certain level of complexity generates too many costs and complications (2005).
4 Pages(1000 words)Essay
Security Management
The protection program can be executed against intrusion, trespass, acts of violence, theft, or fire. The principal purpose of the security management is the development and implementation of procedures, policies, standards, training, and methods for identifying and protecting information, personnel, facilities, property, operations, or material from unauthorized misuse, disclosure, assault, theft, espionage, vandalism, sabotage, or loss.
14 Pages(3500 words)Essay
Security plan
In addition, it is yet vital and significant to maintain exceptional security in a networked structure. Because one PC can have many points of entry and can be used in a wrong way, on the other hand, a computer network has numerous
15 Pages(3750 words)Essay
PC Security
ver, the development of modern technology based tools and applications offered a lot of facilities to the businesses for the management of such security aspects. This report presents a detailed analysis of some of the important PC security management applications. For this
2 Pages(500 words)Essay
It is therefore significant that security is assessed in different contexts. In their examination of the origins and development of security in medieval England Fischer et al (2008) indicate that throughout history the concept of security can be traced to
7 Pages(1750 words)Essay
Security Management
vate security services that have experienced high growth in demand include guarding, armored transport, pre-employment screening, security consulting, private investigations, and alarm monitoring. McCrie (2007) assert that the security director will collect and analyze
3 Pages(750 words)Essay
Cyber Security
Ensuring cyber security is the role of every individual as it’s everyone’s duty to ensure it is safer, more secure and resilient (Marshall, 67). Cyber security refers to the body of
1 Pages(250 words)Essay
HIPAA requires such programs to comply with and apply its rough, role-oriented, access control, authorization, and authentication policies. These policies help make
2 Pages(500 words)Essay
Let us find you another Essay on topic IT and IS Security for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us