StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Importance of Information Security - Essay Example

Cite this document
Summary
The paper "Importance of Information Security" discusses that the value of information security reflects in the cost of securing organizational information. If valuation and protection of information could be easy, then management solutions on information security would be found off the shelf…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful
Importance of Information Security
Read Text Preview

Extract of sample "Importance of Information Security"

? Importance of Information Security The internet is a global collection of networks accessible by various computerhosts in varied ways. Therefore, organizations and individuals alike could easily access any point of the internet irrespective of the geographic or national boundaries or time. Nonetheless, with this convenience comes a myriad of risks including the risk of having valuable information misused, changed, stolen or lost. Electronically recorded information available in a network becomes more vulnerable than the printed information kept in a file behind a locked cabinet. Malicious persons could tamper or steal the information without touching any piece of the paper and could also modify the files and run own programs without their unauthorized activity being discovered. Information security has been inherently recognized as interdepartmental and interdisciplinary and quickly rising to be inter-organizational. For instance, efficient communication encryption system calls for human resources ideas, management ideas and computer science ideas. In addition, other business partners could be involved. This complexity demands coordination and clear cut roles and responsibilities for organizational units and the involved staff. There are important concepts in as far as information security is concerned, namely; availability, integrity and confidentiality. Unauthorized copying or reading of information leads to loss of confidentiality. Similarly, information in an insecure network could be corrupted resulting in loss of integrity. Loss of availability would result when information has been completely erased and becomes inaccessible (Kissel et al., 2008). Risk analysis and management The maiden step in understanding the risks that an organization’s information security faces would be risk analysis. The aim would be to align the business objectives and security objectives to attain competitive advantage (Pesante, 2008). It would also be inform the organization on its budgetary allocation for security. With the understanding of the net worth of its assets, an organization could estimate the expenditure on protection of these assets. Risk analysis involves the identification of threats, assessment of possible loss so as determine which parts need implementation of information security. Therefore, the first step in information security analysis would be the identification of assets and their respective values. This would mitigate spending much more on security than the value of assets being safeguarded. The major task would be to determine how much a company would incur not to safeguard its assets. The organization would then proceed to identify threats and vulnerabilities for each and every asset. This would include identification of vulnerabilities which could affect the integrity, availability and confidentiality of each asset. These should be properly categorized so as to prioritize each asset against the possible risk with Kissel et al., (2008) indicating hardware, software and personnel as possible categories. The risk assessment team would then identify business impact of these threats by calculating frequencies and probabilities of the vulnerabilities. Finally, countermeasures and solutions would be identified so as to reduce potential threat posed by the identified threats. In order to reap the full benefits of any security policy, Pesante (2008) proposes that all the members of staff of a business unit should be made to fully understand the repercussions of violation such a policy which would expose the organization’s systems to malicious attackers. Revision of the security policy would go a long way in enforcing its effectiveness through a review of critical factors. Of importance would also be to ensure that the contacts for Information Security Office are available to all concerned parties. Implementation of information security policies Information security policy should only be implemented after consensus has been reached. The security policy should be available to all members of staff at any time. The staff should then be educated and the impact of such education reviewed using surveys or any other appropriate methods. Security threat management involves checking on desktop or physical threats. Usage of workstations, access to restricted areas and handling sensitive information should be described. System access would require that staff safeguard their passwords and user IDs; they should be trained on how to create strong passwords. Viruses continue to pose serious threats on business data and would keep evolving to be more sophisticated and devastating. Prevention would be more appropriate as opposed to action after destruction. Antivirus software has to be regularly updated and used in regular system scanning. Freeware and other software from untrustworthy sources should never be installed in the organization’s computer systems. Encryption would also ensure information security. Importance of information security Information security has enabled information reach persons who could be trusted with such through authentication and authorization. Authentication allows for prove of identity of the user using appropriate tools such as passwords, smartcards or biometrics. Authorization comes in handy in determining the authority that a user has in engaging in a particular activity such as running a program. Authentication and authorization work together with authentication preceding authorization. Non repudiation prohibits a user from refuting authentication once an activity has taken place in their name (Kissel et al., 2008). As such, an organization instills responsibility among its employees to ensure information security. The greater proportion of business value banks in its information hence the importance of being critical on information security. Information security should therefore not be considered as an information technology issue but a business issue. According to Pesante (2008), information gives the basis of a business’ competitive advantage. Even in not-for-profit organizations, the increased awareness on power of information and identity theft imposes need for information security in the operations of such organizations. Valuation and protection of information thus constitute the most critical tasks for organizations operating in the modern environment. The value of information security reflects in the cost of securing organizational information. If valuation and protection of information could be easy, then management solutions on information security would be found off-the-shelf. The factors influencing information security are unique in each organization: the personnel, applied information technology and physical location. Similarly, information security has an impact on each behavioral and structural aspect of an organization. Any lapse in either of these aspects could provide an opportunity for information to be stolen. Users of the organizational network, whether internal or external make unique contribution to organizational information security. Conclusion Having defined the roles and responsibilities involved in information security, it would be important to document such details. Corporate governance, being critical in modern organizations, would call for documentation of these policies. Effective information security ensures that a business gains competitive advantage in its operations. References Kissel, R., Stine, K., Scholl, M., Rossman, H., Fahlsing, J. & Gulick, J. (2008). Information Security. Revision 2. Gaithersburg, USA: National Institute of Standards and Technology, pp. 800 – 864. Pesante, L. (2008). Introduction to Information Security. Carnegie Mellon University. Retrieved From from http://www.us-cert.gov. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“EISA: Evaluating and Meeting the Security Needs Essay”, n.d.)
EISA: Evaluating and Meeting the Security Needs Essay. Retrieved from https://studentshare.org/information-technology/1445903-eisa-evaluating-and-meeting-the-security-needs
(EISA: Evaluating and Meeting the Security Needs Essay)
EISA: Evaluating and Meeting the Security Needs Essay. https://studentshare.org/information-technology/1445903-eisa-evaluating-and-meeting-the-security-needs.
“EISA: Evaluating and Meeting the Security Needs Essay”, n.d. https://studentshare.org/information-technology/1445903-eisa-evaluating-and-meeting-the-security-needs.
  • Cited: 0 times

CHECK THESE SAMPLES OF Importance of Information Security

Importance of Information Security in E-Commerce

The Importance of Information Security for effectiveness of decision making for managers; its importance from the perspective of honour and goodwill of the organization and also from the technological perspective is discussed in the project.... apid deployment of their cyber security measures helps to provide added security to their online resources such as e-commerce websites, extranets, and intranets.... The project analyses some of the major issues in terms of security of transaction and assets in e-commerce activities and components....
12 Pages (3000 words) Essay

Information Security - Application Supporting Statement

Urgency & Importance of Information Security Any person or organization using computers can easily lose in business without Information Security.... k (Condon, 2011), the information security Professional's compensation continued to rise even during and after the recession.... It cites the Bureau of Labor Statistics (BLS) which estimated the salaries of various information security professionals.... information security Degree The Opportunity According to a March survey conducted by Acumin Consulting Ltd....
1 Pages (250 words) Outline

Importance of Information Security and Privacy

The paper "Importance of Information Security and Privacy" discusses that firewalls should be used as it acts as a gateway for networks connected to the internet and cryptography is a must in ensuring that the data is not intercepted and manipulated with.... Users occasionally can get through the security systems, and it is therefore essential for organizations to also be capable f detecting intruders.... Before beginning to discuss how networks can be secured to improve the prevention f intruders, the reason why it is important to prevent intruders will be pointed out to help understand why network security is vital for many businesses....
6 Pages (1500 words) Essay

Current Status of Security Awareness

These types of information security concerns are applicable to basic user-level information security awareness in the business computing-environments.... The literature expresses three interrelated perspectives of technology, policy, and threat context for a definitional meaning of information security awareness (ISA).... It is, however, currently involved in the review of several information security awareness models for the purpose of doing just that....
4 Pages (1000 words) Essay

Business Management Technology: IT Security Management

(Importance of Information Security Management).... ?? (information security Policy Statement: Objective.... EO of the company gives approval for the information security Policy of a company.... information security should be provided to all the staffs.... There is an information security manager in a business or organization.... Thus IT security Management becomes Even computers and its software are very costly....
7 Pages (1750 words) Essay

The Growing Importance of Information Security

This coursework "The Growing Importance of Information Security" focuses on maintaining the security of information systems that have proved to be the greatest challenge for the management today.... Governmental organizations need to develop application solutions and software packages that can withstand any sort of lapse of information security.... The growing importance of information and communication technology has made privacy and information security-critical issues....
5 Pages (1250 words) Coursework

Importance of Information Security Policy

This coursework "Importance of Information Security Policy" focuses on Information security policy that ensures the credibility of information by safeguarding it from unauthorized infiltration.... The Importance of Information Security policy is essential to all business models.... information security policy is a compilation of guidelines, procedures and processes, which ensure the safety of information in a business or an organization.... A manager will, therefore, have to, 'survey and classify assets, conduct security reviews perform a risk analysis, evaluate and select information security technologies, perform a cost/benefit analysis and test security effectiveness' (Workman, et al....
9 Pages (2250 words) Coursework

The Importance of Information Security

This research paper "The Importance of Information Security" discusses the problem of privacy in our everyday life.... The evolution of information security setup is triggered by the threats that are commonly faced by organizations.... However, in an attempt to define the phenomenon of information security, one can suggest a few important aspects that tend to remain vital for information security, and by analyzing the various aspects, one may reach a reasonable definition (Kissel, 2011)....
14 Pages (3500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us