Got a tricky question? Receive an answer from students like you! Try us!

Information and Systems Security - Essay Example

Only on StudentShare
Author : dboyer

Summary

Network Security is one of the most highly debated topics in the present day world. Network Security has many dimensions. Securing any network is like securing a country's access points with several defense mechanisms. Network Security has become a very essential part of each and every network present on this planet- be it the Internet which we use or the LANs (Local Area Networks) and MANs (Metro Area Networks)…

Extract of sample
Information and Systems Security

But with this ease of information access comes the issue of security. With the increase of information flow, there has been an increase in the number of attacks on information by hackers. Attacks such as Denial of Service (DoS) Attacks, Spoofs, Sniffing, etc. have increased with the increase in the availability of hacking tools which are free of cost. Valuable information is lost in the process. For example, if a customer buys a product of a particular organization through their web-site and a hacker presents himself as the organization and receives the money from the customer, valuable information such as the ID of the customer, his credit card numbers, his passwords are all stolen by the hacker. Therefore such information has to be transferred securely over the Internet. Encryption is the most common way of securing valuable information while transmitting over the Internet (Rahman, 2003). Networks are secured in a different manner. They are secured using tools called "Firewalls". Whenever transactions or information between a customer and an organization are being carried out, a particular pattern is followed. ...
Download paper

Related Essays

Information Systems Security Incident
This paper describes the types of logs that are maintained at B-Concepts, the log management system and discusses the advantages of security logs.…
4 pages (1004 words)
Information Security
There is also a vast body of empirical evidence that demonstrates that general managers ought to be much more involved in the formulation and implementation of information security because they are more able to assess particular types of risks, more attuned to cost-benefit considerations, and better able to integrate information security into a business organization's larger structure than narrow-minded security specialists (Lacity, 2005). In order to more clearly elaborate how organizations should approach information security issues, this essay will discuss how businesses should strike a…
4 pages (1004 words)
Information Security Planning
The company needs to be prepared to combat virus attacks, ingress of unsolicited visitors and possible attacks by competitors on the company's information bank. To provide a safe and working repository of information, it is essential that the company has a well planned security policy in place.…
3 pages (753 words)
Information Security Awareness Construct
Therefore, perspectives and items that represent information security awareness should meet basic operational or user-level information security concerns. Organizational size should not differentiate among the information security concerns for desktop computer management, computer virus protection, and local-area-network issues. These types of information security concerns are applicable to basic user-level information security awareness in the business computing-environments. Therefore, in developing an information security awareness construct, two questions must be considered:…
5 pages (1255 words)
Information Systems Security
the same time, despite all the efforts made by the government to ensure cyber security and intrusion prevention, it seems that a lot more needs to be done before American can be considered secure from intrusion or attack from cyber terrorists.…
3 pages (753 words)
Information Security
Based on the nature of the information, we can classify information into two board categories; private and public. Public information are open to anybody since it may not cause any harm to the public and hence it is not necessary to protect it whereas private information are intended for a specific group of people and hence it should be protected from unauthorized use. Private information can be manipulated, modified or misused in many ways for personal gains and such manipulations may cause immense problems to others and hence it is necessary to protect it from unauthorized use.…
6 pages (1506 words)