StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Framework in the Modern World - Research Paper Example

Cite this document
Summary
The paper "Security Framework in the Modern World" highlights that the use of such security frameworks as the ISO 27000 series is essential for the development of and preservation of the diverse databases that have come to be heavily rely on all over the world…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
Security Framework in the Modern World
Read Text Preview

Extract of sample "Security Framework in the Modern World"

Security Framework In this age where the use of computers and networks related to them has become commonplace, there has developed problems concerning the diverse user frameworks that have been created and this has created the need to ensure the security of the said frameworks. This has led to the development of such security frameworks as the ISO 27000 Series which has become an important factor to be considered if individuals as well as organizations and institutions are to be able to protect themselves from malicious people and software from the internet. Most computer network threats come from the internet and are done intentionally because people for malicious intentions develop them. The use of the ISO 27000 Series security framework is, therefore, an endeavor by individuals as well as organizations to protect their information and other digital assets from assaults from the internet. The measures stipulated in the ISO 27000 Series framework measures will involve various steps, the most important of these steps being an individual’s understanding of the different forms of cyber-attacks that they are likely to encounter (Ma, Schmidt and Pearson 58). Once one has knowledge of this, then it is his or her responsibility to ensure that they have put in place the best security system they can get their hands on. There exist diverse types of hazards and these can be regarded as to be of unstable levels and risks to an individual’s personal information in their computers. The higher the possibility of an attack, the more progressive the security system, that is to be put in place to ensure that the threat is minimized. The ISO 27000 security framework activities involve measures to prevent threats ranging from malicious codes, also known as malware and spyware, to computer viruses. Some of these viruses are so serious that they have the ability to erase entire operating systems of computers. These viruses also facilitate hackers to have right of entry to all the data stored in the infected computers, ensuring that they have access to information, which can be used for their own gain. It is necessary for individuals and companies to avoid such invasion into their computer systems by having the best security framework (Serrhini and Moussa 159). Measures taken involve the acquisition of antivirus software that is reliable, frequent checking of software to ensure that they are secure from attacks. The computer software should be updated frequently to assure they are working in full capacity. Thus, it vital for organizations to ensure all departments are conscious of their ISO 27000 security framework because it is not known when a threat is likely to be encountered. Borders have relevance in tackling information security, and looking at borders, domains of various countries interact because they do not have borders, therefore, the domains of a nation will be related to the nation’s willingness to assert sovereignty in the domains. With the detection of threats at the various nation states, it is possible to retain legitimate response actions by the state and this will be an important actor of the border in ensuring they continue being relevant. In cyber space, the territorial borders broadly define sovereignty of a specific nation irrespective of the domain and ability to locate domains physically. Despite the borders becoming insignificant when carrying out legal commerce, they are highly significant when carrying out policing actions of transnational threats. In China, there is a severe internet information security because there is a leakage of information and this requires protection of privacy and other personal data should be strengthened because internet abuse has become unscrupulous. Sufficient protection of private data in China is lacking and this is because of the existence of loopholes in the safety of public information because of ineffective management mechanism (Veiga and Eloff 361). The reasons behind mismanagement of public information are lack of emphasis on information security is incompleteness of the institutions and legal systems. Strategies for information security are insufficient and, therefore, the country should carry out further developments on internet technologies. It is barely satisfactory to carry out general public education but an incorporation of international cooperation is needed. It is vital for all networks to be concerned with the defensive mechanisms of their information systems through a reactive approach that focuses on vulnerabilities and actual threats. This means one has to wait until happens on the internet and then go for the person who is the bad guy. This is easy to manage although it does not guarantee protection of a government’s infrastructure. For instance, if there is a breach of city’s water supply and the amount of chlorine put on the water becomes excess, the best defensive mechanism has to be put in place to prevent people from succumbing to the poisonous water. Organizations should carry on with their operational roles while following guidance on response to cyber incidents. Even though this thought may be good, cyber threats are often not kinetic in nature as compared to other threats taking place in the United States. Therefore, the response by the Defense Department of the United States does not work on incidents of cyber arena. The reason behind the threat not working is that there are difficulties of locating the place and the person committing the offense making it difficult to determine the agency that is responsible for various incidents (Trim 493). If investigations are carried out, lines would be crossed because duplication may occur while information may not be shared, let alone communication, thus there is the need to have clearly defined roles for various government agencies hence the need for the use of the ISO 27000 series. With the presence of 17 infrastructure sectors and each sector with its own federal agency chairs council knowledgeable about its specific sector the use of the ISO 27000 series security framework should not be treated as a separate issue. Therefore, it is not advisable to let the agencies to defend themselves against cyber threats by using the best possible strategy since it is a fact that the benefits of this alternative are scarce and the argument for this is that the organizations are already established hence they can manage their security frameworks internally. There can be strong claims for this argument but what has been put in place is not effective in defending cyber threats, besides this benefits that accrue from continuing with the current infrastructure are few. The setbacks of this alternative are the presence of biasness; lack of coordination, no leadership is present and low security framework prioritization. Most organizations have established their ways which have often not been designed to defend against cyber threats, these organizations have low probability of altering their structures and haw they carry their operations (Nissenbaum 61). Each and every organization has its own visions and missions and they will protect their networks and not those of other organizations, this shows the lack of coordination between organizations. The use of the ISO 27000 Series is important because of the fact that security framework leadership within organizations in the United States was missing, and there had to be leadership accountability in all federal governments, coordination attempts for various agencies since all had failed due to poor resource management. In conclusion, the ISO 27000 Series security framework has been a priority in many individual agencies because most agencies are created to be able to accomplish their own missions making security framework to be viewed as an important factor, which has to be budgeted for to ensure the tackling of information security threats. It is, therefore, necessary for companies to prevent any intrusion into their computer systems by having the best security frameworks. These involve the getting hold of the best software that is reliable as well as regularly checking this software to ensure that they are thwarting attacks. The software has to be repeatedly updated so that there is a guarantee that it is functioning at its full capacity, and this ensures that there is additional security against attack. It is important to ensure that individuals as well as organizations are conscious of their security frameworks because it is not known when a threat is likely to be encountered. The use of such security frameworks as the ISO 27000 series is essential for the development of and preservation of the diverse databases that have come to be heavily relied on all over the world. Work Cited Ma, Qingxiong, Mark B. Schmidt, and J. M. Pearson."An Integrated Framework for Information Security Management."Review of Business 30.1 (2009): 58-69. Nissenbaum, Helen. "Where Computer Security Meets National Security1."Ethics and Information Technology 7.2 (2005): 61. Serrhini, Mohammed, and AbdelazzizAitMoussa. "HOME USERS SECURITY AND THE WEB BROWSER INBUILT SETTINGS, FRAMEWORK TO SETUP IT AUTOMATICALLY." Journal of Computer Science 9.2 (2013): 159-68. Trim, Peter R. J. "Managing Computer Security Issues: Preventing and Limiting Future Threats and Disasters." Disaster Prevention and Management 14.4 (2005): 493-505. Veiga, Dado., and Eloff, Jan. "An Information Security Governance Framework." Information Systems Management 24.4 (2007): 361-72. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Framework Research Paper Example | Topics and Well Written Essays - 1250 words”, n.d.)
Security Framework Research Paper Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1485395-security-framework
(Security Framework Research Paper Example | Topics and Well Written Essays - 1250 Words)
Security Framework Research Paper Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1485395-security-framework.
“Security Framework Research Paper Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1485395-security-framework.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Framework in the Modern World

What is European Security

The establishment of the European Union led to the need for the development of a framework that will ensure the protection of the member states against any potential threat of their borders or their interests (political, social and financial).... The concept of security has become.... The level at which security influences the rules and the policies of the European authorities but also of the member states is being differentiated under the influence of the political, social and One of the most important difficulties when trying to develop effective security schemes has been the identification of the conditions under which these schemes will operate; another issue in regard to the above initiative is the understanding of the needs that these schemes will serve....
20 Pages (5000 words) Essay

PHP Libraries and Frameworks

Frameworks are significant innovation in modern website design.... There exists numerous development languages and practically every language has a framework of sorts.... The server-side scripting languages have realised more advanced development in terms of framework.... For instance, PHP has several frameworks; Codeigniter, Zend framework etc....
6 Pages (1500 words) Essay

Microsoft's Security Measures

Information security is an important aspect of modern human activities and processes due to the increased use of technology and networks, which pose threats to private and confidential data or information.... Any association that has a PC framework and delicate data need to safeguard that data.... The paper "Microsoft's security Measures" states setting a firm's agenda without proper security settings in place is inappropriate for most firms....
7 Pages (1750 words) Case Study

Layers of Physical Security

he present-day physical security is inconceivable without the wide usage of technological advancements, which has been found to increase significantly the dependability of advanced security frameworks and minimize threats to the physical security framework.... Then again, innovations frequently confront new dangers that fortify the more extensive implementation of new technologies, but the primary point in the advancement of a powerful physical security framework is the improvement of numerous layers of physical security (Modi et al....
9 Pages (2250 words) Essay

PHP Libraries and Framework

According to Grehan, it is undeniable that PHP is widely and extensively used as a web development language even though the language does not exclusively rule the website development world.... This report "PHP Libraries and framework" discusses an evaluation of CodeIgniter as a PHP framework.... Through PHP libraries and frameworks like CodeIgniter, Zend framework and CakePHP one can easily build a scalable and more easily maintainable web application in much less time as opposed to building it from scratch....
10 Pages (2500 words) Report

Threat Posed by Cyber Crimes to Homeland Security

Cyber crime is a major global threat in our world today.... Cybercrime and insecurity is a major world threat to our daily lives and the threat posed by such activities as identity theft to western nations is significantly large to go unnoticed.... modern living dictates that lives should be built over the internet.... "Threat Posed by Cyber Crimes to Homeland security" paper points out an example of an incident that has recently occurred and how it is a challenge to homeland security....
6 Pages (1500 words) Coursework

The UK Defense Strategy, Concepts, and Theories of Strategy

This paper "The UK Defense Strategy, Concepts, and Theories of Strategy" analyzes the UK defense strategies that have been developed over the years based on the new distribution capability framework and theories that illustrate the benefits of the strategy to the nation.... Every country has the opportunity to define and decide on a unique strategy that will work in its favor to attain security even at the international and national levels (Buzan, Wæver, and Wilde 1998, 9)....
9 Pages (2250 words) Essay

Federal and State Laws and the Security Agencies Operate

The Federal system majorly deals with the overall framework of security without focusing on particular aspects.... Several countries adjusted their security and legal framework towards preventing possible incursion by the related terror groups.... The paper "Federal and State Laws and the security Agencies Operate" investigates the exercise and execution of private security obligations.... The many States are charged with the mandate of coming up with their unique sets of laws regarding the private security aspects....
35 Pages (8750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us