Information Security and Privacy

College
Essay
Miscellaneous
Pages 6 (1506 words)
Download 0
Networks are built in order to allow users to share, however it also allows other users the possibility to obtain information and other data that are not meant for them. This is becoming a bigger problem as organizations connect their private networks onto the internet…

Introduction

Although there are several methods to prevent unauthorised access; users occasionally are able to get through the security systems, and it is therefore essential for organizations to also be capable f detecting intruders.
Before beginning to discuss how networks can be secured to improve the prevention f intruders, the reason why it is important to prevent intruders will be pointed out to help understand why network security is vital for many businesses.
As organizations around the world rely heavily on computers for all their information storage and processing, unprotected computers and networks can be an easy means for anyone to obtain this information. Also as organizations become increasingly dependent on computers and networks to run the business any damage can cause numerous problems for a business with possible costs within the millions. (Fitzgerald 1-7)
These costs are caused by the inability to use computers therefore affecting productivity and sometimes causing the complete inability to run the business. As computer systems assist heavily in running businesses and store many f the organizations private data it is easy to see why organizations need to secure their computer systems or it will cost them.
Passwords is a relatively easy and cheap ...
Download paper
Not exactly what you need?

Related papers

Security and privacy in e-commerce
Whenever a user travels the cyber space, (s)he leaves his/her identity at almost every step of the way (Privacy Rights Clearing House, 2006). Whether one is signing up for internet service with Internet Service Provider (ISP), sending emails, browsing internet sites, or using a search engine to locate required information, the identity of the machine is being shared, and it can be misused by…
Privacy, Security in the 21st Century
Others, however, find even the old surveillance technologies to be disturbing. The ubiquitous security surveillance camera, for example, still has the power to stir controversy; witness the post-9/11 reaction to the National Park Service's plan to put round-the clock security cameras in the national parks within the nation's capitol (DeBose 1). For those people concerned with any new-found…
Information Security Master Essay
IT security policies in the private sector are also reviewed.…
Security and Privacy in the Network Context
This Virtual Private Database feature controls access to individual row in the database. It works by dividing the database for use by diverse type of users and keep it secure from illicit access.…
Information Security and Privacy
Although there are several methods to prevent unauthorised access; users occasionally are able to get through the security systems, and it is therefore essential for organizations to also be capable f detecting intruders.…
Information security legislation
Never the less, times have changed and the recent past has seen a lot of regulations and legislation which impacts information security. Some of these legislations are the European Data Protection Directive, Sarbanes-Oxley Act, and the Capital Adequacy Directive, just to mention but a few. In the event of these new compliance rules organization are being forced to resort a range of codes and…
Customer Information Privacy
It is indisputable that no confidential information concerning the customers and their buying behavior should be disclosed to other businesses either for consideration or otherwise. The CNET News reports that companies like Boo.com, Toysmart and CraftShop.com have tried to sell their customers' data (phone number, home address and credit card number) to other business entities (Sandoval, 2000).…