StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Security in Technology - Research Paper Example

Cite this document
Summary
The paper "Information Security in Technology" discusses that any company that focuses on excellent performance knows that security information and physical security are some of the keys to a successful business. Implementing all these plans in organizational projects is very important…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
Information Security in Technology
Read Text Preview

Extract of sample "Information Security in Technology"

? Information Security in Technology Executive Summary Information security is one of today’s biggest threats in companiesthat depend on modern technology for storage of important information. It is the job of a company to store important information concerning transactions made, number of employees, and other managerial secrecy. Every company needs to have an effective system for preserving both information and physical security for the sake of their success. Some of the risks that exist in companies are such as; having vulnerable information storage systems that one can easily hack, having few skilled personnel, and little knowledge on modern technology. Information Security Project Plan There are many differences between physical security, and information security. Information security is concept that entangles most aspects of the society, majorly because of the ubiquitous adoption of computing technology in the modern world. In our daily lives, we use computers at work place for our employers, play on computers in homes, study online, do business, and check emails, and so on. The level of development in the modern world has greatly improved especially with the increased rate of innovation, and growing technology. Everyone in the modern world is impressed at how the level of technology is increasing so fast because they benefit from it in very many different ways (Matford & Whitman, 2012). Owing to the fact that most people have the urge to make things easier in the modern world, everyone is turning towards the direction of Information technology because online seems to be the future of everyone, and everything. The web is viewed as the future of most activities in the world today since currently it serves as a very useful tool even though it also has some intimidating proposition. Although technology enables more productivity and allows access to much information, it also carries a lot of security issues. Employers preserve information about their companies, employees, and other important documents on the computer systems. Banks also store vital information on money transaction between them, and other clients. One of the most common challenges in the modern technology world is hacking, and piracy. When someone hacks information about a company, then this leaves the company in danger of either breaking down or losing credibility from the public that it serves because this interferes with its reputation, and competitors can take advantage of this situation. Employers can lose millions of dollars, and suffer damage of reputation, face legal prosecution through system configuration when hackers accesses personally identifiable data. These issues are more common in the media, and they have disturbing regularity (Matford & Whitman, 2012). The rapid growth of technology brings many security issues, and this means that security standards need to be put in place with effective implementation. When discussing security issues, it is often helpful to use a model that has a baseline or foundation. This provides consistent concepts, and set of terminologies, which professionals can refer to when security issues arise. Information security has three primary concepts that are confidentiality, integrity, and availability triad since it focuses on security in relation to available data. Concept of confidentiality is similar but not the same as privacy. This component entails protecting data from those who are unauthorized to view it. One of the best examples of implementation of concept of confidentiality is when a person goes to the ATM to withdraw money; he or she is very keen on maintaining, and protecting the account number, and card pin number. This is how simple concept of confidentiality operates (Matford & Whitman, 2012). This concept of information security goes hand in hand with that of physical security because the idea of confidentiality is still applicable in many ways. With the rapid expansion of global networks through interconnecting information systems in the modern world, computing solutions and the smooth operation of communications becomes vital. Conversely, recurring events like virus, worm attacks, and the success that criminal attackers portray, depicts the weaknesses of the current information technologies. This really illustrates the need for heightening the security of these systems. While attempting to secure existing networks and systems, organizations must draw on their current pool of information security practitioners. For development of more secure computing environment in the future, organizations depend on the knowledge of professionals of the next generation since they have correct mix of skills and experience to manage the complex issues of information security. Students learning technology management have the mandate to learn and expound more on the possible solutions to issues of information security both in the current world and in the future. Principles of information security entail expanding the knowledge that students, and academic textbooks acquire. Information security is a vital element of management in organizations in the modern world and that is why there are dozens of quality publications on the topic of information security. Practitioners of information security perform their duties with assurance that they can influence knowledge to students of security management through textbooks (Matford & Whitman, 2012). Organizations need to learn more on the components of security since this is one f the ways in which they can survive in a competitive environment of security management. By creating an information security system in an organization, this guarantees them that they cannot lose vital information from hackers or other computer viruses. Information security systems helps organizations to operate effectively without losing any of their vital information and this means that all the projects they initiate remains safe for the longest time possible and this provides the most effective way of preserving information. An information security system in organizations provides confidentiality among the workers. When an organization has effective information security systems, then this means that vital information on the company will only be accessible to individuals who are part of the organization. Confidentiality is a very important element in an organization. Another important factor to consider when working on a project in information security is integrity of people working within an organization. This is through ensuring that everyone has access to their personal information without any alterations of malicious actions or through technological mistakes in an organization. Another important aspect of information security is that it ensures that there is availability of vital information of an individual who wants to access it at any time they need to (Matford & Whitman, 2012). In conclusion, any company that focuses on excellent performance knows that security information, and physical security is some of the keys of successful business. Implementing all these plans in organizational projects is very important. Concepts of storing data and information of a company ensure effective monitoring of security components and so on. Having knowledge, and expertise on the basic knowledge of physical, and information security in an organization is one of the effective ways of running projects in an organization, and this means that threats to information security should be well kept. Data on Lost Information EMPLOYEES First_Name Last_Name Hire_Date Salary Manager_ID Department_Name 1 Michael Palmer 2.8.2010 $2100 #56819 IT_Department 2 Melissa Yung 2.8.2010 $1900 #56819 Sales_Department 3 Steve Legrand 19.12.2011 $3000 #56819 Human_Resource 4 Alison Taylor 5.12.2012 $ 2500 #56819 IT_Department Software Process for retrieving back the Information Data Software that can be used to restore lost information in a company is through creating data sets that provides user information on BI Publisher. The steps of creating variables on data sets are; 1. Click data sets on the component data model editor 2. Click New data sets 3. Select the data type you want to use from the list to launch an appropriate dialog 4. You will find several fields required to complete each data set type E.g. SQL Query, MDX Query, LDAP Query, HTTP (XML File) and Microsoft Excel File among others After choosing any of these data set types, then Edit the existing data set type, which will be displayed on the working pane References Whitman, M. E., & Matford, H. J. (2012). Principles of Information Security: 4th Edition. United States: Course Technology, Cengage Learning Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Technology Evaluation and Recommendation Research Paper - 2”, n.d.)
Technology Evaluation and Recommendation Research Paper - 2. Retrieved from https://studentshare.org/information-technology/1495721-technology-evaluation-and-recommendation
(Technology Evaluation and Recommendation Research Paper - 2)
Technology Evaluation and Recommendation Research Paper - 2. https://studentshare.org/information-technology/1495721-technology-evaluation-and-recommendation.
“Technology Evaluation and Recommendation Research Paper - 2”, n.d. https://studentshare.org/information-technology/1495721-technology-evaluation-and-recommendation.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security in Technology

Information Technology Security

The case study 'Information technology Security' demonstrates that computers came in and finally the Internet.... Manufacturing and construction industries took hold of the opportunity and recognized the many benefits of technology.... In the 1970s, there was an increase in the usage of information technology.... Information technology can perform countless tasks for the organization like capturing, storing, processing, exchanging, and using information for the company....
8 Pages (2000 words) Case Study

Technology of Information Security

Technology of information security Name Institution Technology of information security Introduction The use of cryptography is a necessity for the consequence of the revolution of information in the world today.... Methods of encryption are on the rise because of the rapid growth in the technology sector all over the world.... Its disadvantages come mainly because the technology is sometimes not used as required.... Cryptography is a very powerful and important technology that can be used to protect information sent to emails and all financial based transactions....
3 Pages (750 words) Essay

Information Technology Security

The protection of such information as bank account statements, credit card numbers, personal information, government documents, and trade secrets remain a critical part of information security.... Name: Tutor: Course: Date: University: Information technology and Security Introduction CIA denotes confidentiality of information, integrity of information, and availability of information.... SSL/TSL details a security protocol for communication over the internet has overtime been employed, in conjunction with a broad range on internet protocols, to guarantee security (Whitman and Mattord 2012, p....
3 Pages (750 words) Essay

Information Technology and Security

It will demonstrate how with the advancement in technology crimes too have risen and most often the people entrusted with the system are most likely to commit the crimes.... This essay "Information technology and Security" is about new information products and services available for use in organizations include teleconferencing, microcomputers, software packages, distributed data processing, automated offices, voice mail, networking, database management systems....
27 Pages (6750 words) Essay

Information technology director security plan

If I was an information technology director, I would: ... nsure the protection and management of information technology resources.... security is not primarily a technical or technological issue but is a management issue as the incidents of lax security and bank failures due to redundancies and other management errors have increased.... security is not primarily a technical or technological issue but is a management issue as the incidents of lax security and bank failures due to redundancies and other management errors have increased....
1 Pages (250 words) Coursework

Technology of Information Security

Moreover, in order to help present effective data security in the above discussed situations, there exist a wide variety of IT security technologies that can be used by the business organizations to keep their sensitive data and information secure during storage and network communication.... However, the most commonly used scenarios TECHNOLOGY OF information security Technology of information security Affiliation At the present, the majority of business organizations use a distributed computing environment to store their data and information....
2 Pages (500 words) Essay

Information Technology- Security

Therefore, organizations need to monitor their security in order to function effectively.... In conclusion, the protection of information is essential to the security in organizations.... International Conference on information security and Assurance (ICISA) , & Park, J.... Advances in information security and its application: Third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009: proceedings.... In the Information technology- Security Information technology- Security Information Assurances Information assurance describes the measures that organizations take to protect and restore the quality of information in a bid to enhance the reliability of its sources....
2 Pages (500 words) Research Paper

Information Technology Security

This coursework "Information technology Security" describes different types of attacks and the main aspects of security.... Criminal justice has had to catch up and develop crimes and sanctions based on the usage of information communication technology.... The discussion that follows will outline some of the challenges of information technology security.... ifferent attack methodologies can be employed by a cracker to attack an organization whose information technology is not secure....
7 Pages (1750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us