StudentShare solutions
Triangle menu

Information and Systems Security - Essay Example

Not dowloaded yet

Extract of sample
Information and Systems Security

But with this ease of information access comes the issue of security. With the increase of information flow, there has been an increase in the number of attacks on information by hackers. Attacks such as Denial of Service (DoS) Attacks, Spoofs, Sniffing, etc. have increased with the increase in the availability of hacking tools which are free of cost. Valuable information is lost in the process. For example, if a customer buys a product of a particular organization through their web-site and a hacker presents himself as the organization and receives the money from the customer, valuable information such as the ID of the customer, his credit card numbers, his passwords are all stolen by the hacker. Therefore such information has to be transferred securely over the Internet. Encryption is the most common way of securing valuable information while transmitting over the Internet (Rahman, 2003). Networks are secured in a different manner. They are secured using tools called "Firewalls". Whenever transactions or information between a customer and an organization are being carried out, a particular pattern is followed. Firewalls recognize and allow only these transactions or processes to be carried out and block out all the unrecognized patterns. By implementing Firewalls, most of the attacks from the hackers can be kept out. Securing a network just does not happen. There are many issues to be considered when making policies for network security. The three main issues back in the earlier days were Confidentiality, Integrity and Availability. Due to the advances in the technologies, these issues have been mostly resolved. But in the present day Networks, other issues have appeared. These issues will eventually result in the breaching of confidentiality, integrity and availability thereby defeating the cause of coming up with Network Security policies.
Security Factors
Confidentiality: Confidentiality is ensuring that sensitive information does not fall into the hands of those who are not authorized to have it (Dhillon, 2001). Confidentiality is also known as secrecy or privacy.
Integrity: Integrity means that the information is protected against unauthorized changes that are not detectable to authorized users (Kinkus, nd).
Authenticity: Authentication means that the parties involved in communication first prove their identity before communication can begin (Tipton & Krause, 2007).
Risk to Data
Data is the most crucial asset of a company. Remote Data Backups Inc, a leader in data security mentions the following possible reasons for threats to data (, 2007):
Hard Drive Failures: Hard drives are mechanical magnetic storage devices that are extremely susceptible to failure. Head crashes, circuit board shorts, electrostatic shocks, power surges, etc. can all lead to immediate crash of the hard drives.
Viruses: Dangerous viruses can easily wipe out tones of data in matter of seconds. They are designed to affect nearly all parts of an IT system such as Operating Systems, Applications, Networks and Databases.
System Changes: Making any inadvertent changes to an IT system may render the system useless.
Power Failure: Power surges, sags and failures can damage hard drives ...Show more


Network Security is one of the most highly debated topics in the present day world. Network Security has many dimensions. Securing any network is like securing a country's access points with several defense mechanisms. Network Security has become a very essential part of each and every network present on this planet- be it the Internet which we use or the LANs (Local Area Networks) and MANs (Metro Area Networks)…
Author : dboyer
Information and Systems Security essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Information and Systems Security"
with a personal 20% discount.
Grab the best paper

Related Essays

How Should Organizational Information Systems Be Audited for Security
In addition, the extensive scope of work comprises the evaluation of wide-ranging processes and application controls. Additionally, the present condition of technology necessitates audit steps that share to testing methods of access paths appearing due to the connectivity of LAN or local-area networks, WAN or wide-area networks, Internet, intranet etc., in the information technology environment (U.
4 pages (1000 words) Essay
What security policies and systems are in place to prevent unauthorized access to the EMR and other sources of sensitive patient information
What security policies and systems are in place to prevent unauthorized access to the EMR and other sources of sensitive patient information? An Electronic Medical Record (EMR) is a programmed medical record which is generated in the organization that provides care to the patients such as healthcare centers or hospitals (Carter, 2001).
5 pages (1250 words) Essay
Information Systems Security Incident
The CONOP is defined to control the information & financial loss, for business continuity, security policy review and security awareness programme. The CIRT organization structure is detailed; roles and responsibilities of the team members are defined. CIRT acts on information & security logs to anticipate security threats and to resolve the security incidents.
4 pages (1000 words) Essay
Information Security
The objective data demonstrates a couple of points quite clearly. First, as noted by Angus, the organizations that decide to implement the strictest types of security are often much less secure than companies with more balanced approaches to security; he refers to this as a U curve in which a certain level of complexity generates too many costs and complications (2005).
4 pages (1000 words) Essay
Information systems security incident
CONOP outlines the key players, their roles and responsibilities in the event of information security incident. The CONOP is defined to control the information & financial loss, for business continuity, security policy review and security awareness program.
8 pages (2000 words) Essay
Information Systems Security
America paid the heaviest price possible for a lack of security with the events of 9/11 as even the Pentagon was unable to avoid carnage. After the attacks however, security became a paramount concern and that included digital security.
3 pages (750 words) Essay
Information Systems and Security
At the present time, there are better ways to communicate, transfer data, information retrieval as well as distribution, dealing and especially online business, but all these improvements in the fields of information technology also brought the challenges regarding the security.
8 pages (2000 words) Essay
Information Security
The organization deals with healthcare so, because of its nature of work it needs to store a lot of information regarding healthcare, finance and similar other
2 pages (500 words) Essay
What security policies and systems are in place to prevent unauthorized access to the EMR and other sources of sensitive patient information
EMR enables to augment sharing as well as accessibility of health related records among certified individuals (Skolnik, 2010). The security policies related to EMR have been considered as a major concern
4 pages (1000 words) Essay
Information Systems Security Survey
IRS has an information security risk management program that is mainly constructed to balance the company’s security duties alongside other business duties. The company must continue with its operations despite the exposure to
3 pages (750 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation