StudentShare solutions
Triangle menu

Information Security and Privacy - Essay Example

Nobody downloaded yet

Extract of sample
Information Security and Privacy

Although there are several methods to prevent unauthorised access; users occasionally are able to get through the security systems, and it is therefore essential for organizations to also be capable f detecting intruders.
Before beginning to discuss how networks can be secured to improve the prevention f intruders, the reason why it is important to prevent intruders will be pointed out to help understand why network security is vital for many businesses.
As organizations around the world rely heavily on computers for all their information storage and processing, unprotected computers and networks can be an easy means for anyone to obtain this information. Also as organizations become increasingly dependent on computers and networks to run the business any damage can cause numerous problems for a business with possible costs within the millions. (Fitzgerald 1-7)
These costs are caused by the inability to use computers therefore affecting productivity and sometimes causing the complete inability to run the business. As computer systems assist heavily in running businesses and store many f the organizations private data it is easy to see why organizations need to secure their computer systems or it will cost them.
Passwords is a relatively easy and cheap ...
It might seem that if companies do not connect their networks to the internet there will be no security problems.
Therefore meaning security is needed on networks even if it is not connected to the internet. Two main types f security can be used here; passwords and physical security. (Fitzgerald 1-7)
Passwords is a relatively easy and cheap form f security that can be implemented on a network, it also provides a good level f security as long as passwords are well kept by employees. With the use f passwords network managers can monitor the use f the network by its users by being able to see who logs in and where their logged in to, as well as what they have done. With more advanced technology network managers can also detect when and where there is an intruder and what the intruder has done. Fundamentally passwords will keep those who are not authorised away from restricted sections f the network, ultimately sustaining an adequate level f security.
Physical security is basically using physical means to prevent certain employees from using certain sections or computers on the network. This may include computers being kept in secure rooms with key card or identification security.
As organizations connect their networks to the internet, the risk f intruders rises dramatically as there are millions f users online; it also allows users from any part f the world to access your private network. This security issue is heightened as users within the network begin to access areas f the internet that are less secure. The most commonly used method to help prevent intruders and improve the security f the network when connected to the internet is the use f internet firewalls.
Basically a firewall is capable f preventing ...Show more


Networks are built in order to allow users to share, however it also allows other users the possibility to obtain information and other data that are not meant for them. This is becoming a bigger problem as organizations connect their private networks onto the internet…
Author : alvahtowne
Information Security and Privacy essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Information Security and Privacy"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Information Security
Information Security. Information is certainly considered as a significant benefit in the working of any corporation. In view of the fact that the data the gather, save and distribute everyday is the extremely description of their dealings with consumers and retailers, as well as the basis for their inner operations and business procedures.
4 pages (1000 words) Essay
Information Sensitivity and Protection of Data
Furthermore, BIDMC’s security and privacy policy also encompasses the password guidelines and implementation of remote access software. In this way, these rules and regulations ensure the less wastage of technology resources. In addition, this arrangement as well ensures the proper establishment of the corporate security and privacy.
3 pages (750 words) Essay
Evaluate technical security or privacy products for selection
While some viruses disable the functioning of devices such as the monitor, printer, and scanners, others make it impossible to access the internet. Yet again, some viruses slow down the computer others transmiting vital information to hackers whoo may then strike in various ways.
3 pages (750 words) Essay
Information Security Master Essay
This thesis is structured in three parts each with sub-divisions. In part 1 (2.0 -- 2.9), we survey and review Information Technology Policies and Acts of Congress, Presidential Executive Orders on IT , Office of Management and Budget (OMB) Circulars on IT.
42 pages (10500 words) Essay
Accounting Information System: Security, Privacy and Other AIS Issues
Accounting information systems are a vital part of an organization’s day-to-day operations. Every transaction has to be recorded in order to produce financial statements or any type of informal report that management may want to use for analysis. For this reason, accountants were some of the first people to need information systems.
13 pages (3250 words) Essay
Privacy from the information security perspect
Humans performed a lot of activities such as paying bills, online activity, private phone call conversations, decisions concerning ones professional future, buying preferences, financial records and many other events which are suppose to be private decisions and occurrences.
5 pages (1250 words) Essay
Security and Privacy
This security policy will serve as a framework and organizational security strategy for the St. John’s Hospital. This paper provides the development of the framework and organizational security strategy for the St. John’s Hospital. This paper
8 pages (2000 words) Essay
Privacy and surveillance in the Information Age
In a modern world, the use of technology has managed to increase communication among human beings, but at the expense of personal privacy. The issue of surveillance is one that has received the most heated debate in the American public
12 pages (3000 words) Essay
Public Privacy and Information Security Policy
The present study tries to identify major setbacks, legal issues and vulnerabilities of the procedures and laws that are in place to
13 pages (3250 words) Research Paper
Information Policy
Businesses are now experiencing a significant risk to privacy due to increased tort litigation, wide media attention, and enforcements from governments. Perhaps the need for
1 pages (250 words) Essay
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
Comments (0)
Click to create a comment
Contact Us