Information and Systems Security

College
Essay
Miscellaneous
Pages 3 (753 words)
Download 0
Network Security is one of the most highly debated topics in the present day world. Network Security has many dimensions. Securing any network is like securing a country's access points with several defense mechanisms. Network Security has become a very essential part of each and every network present on this planet- be it the Internet which we use or the LANs (Local Area Networks) and MANs (Metro Area Networks)…

Introduction

But with this ease of information access comes the issue of security. With the increase of information flow, there has been an increase in the number of attacks on information by hackers. Attacks such as Denial of Service (DoS) Attacks, Spoofs, Sniffing, etc. have increased with the increase in the availability of hacking tools which are free of cost. Valuable information is lost in the process. For example, if a customer buys a product of a particular organization through their web-site and a hacker presents himself as the organization and receives the money from the customer, valuable information such as the ID of the customer, his credit card numbers, his passwords are all stolen by the hacker. Therefore such information has to be transferred securely over the Internet. Encryption is the most common way of securing valuable information while transmitting over the Internet (Rahman, 2003). Networks are secured in a different manner. They are secured using tools called "Firewalls". Whenever transactions or information between a customer and an organization are being carried out, a particular pattern is followed. ...
Download paper
Not exactly what you need?

Related papers

Information Systems Security Incident
This paper describes the types of logs that are maintained at B-Concepts, the log management system and discusses the advantages of security logs.…
Information and Systems Security
But with this ease of information access comes the issue of security. With the increase of information flow, there has been an increase in the number of attacks on information by hackers. Attacks such as Denial of Service (DoS) Attacks, Spoofs, Sniffing, etc. have increased with the increase in the availability of hacking tools which are free of cost. Valuable information is lost in the process.…
Information Security Master Essay
IT security policies in the private sector are also reviewed.…
Information Security
There is also a vast body of empirical evidence that demonstrates that general managers ought to be much more involved in the formulation and implementation of information security because they are more able to assess particular types of risks, more attuned to cost-benefit considerations, and better able to integrate information security into a business organization's larger structure than…
Information Security Planning
The company needs to be prepared to combat virus attacks, ingress of unsolicited visitors and possible attacks by competitors on the company's information bank. To provide a safe and working repository of information, it is essential that the company has a well planned security policy in place.…
Information Security Awareness Construct
Therefore, perspectives and items that represent information security awareness should meet basic operational or user-level information security concerns. Organizational size should not differentiate among the information security concerns for desktop computer management, computer virus protection, and local-area-network issues. These types of information security concerns are applicable to basic…
Information security legislation
Never the less, times have changed and the recent past has seen a lot of regulations and legislation which impacts information security. Some of these legislations are the European Data Protection Directive, Sarbanes-Oxley Act, and the Capital Adequacy Directive, just to mention but a few. In the event of these new compliance rules organization are being forced to resort a range of codes and…