StudentShare solutions
Got a tricky question? Receive an answer from students like you! Try us!

Essay example - Information Security and Privacy

Only on StudentShare
Pages 6 (1506 words)
Networks are built in order to allow users to share, however it also allows other users the possibility to obtain information and other data that are not meant for them. This is becoming a bigger problem as organizations connect their private networks onto the internet…

Extract of sample

Although there are several methods to prevent unauthorised access; users occasionally are able to get through the security systems, and it is therefore essential for organizations to also be capable f detecting intruders.
Before beginning to discuss how networks can be secured to improve the prevention f intruders, the reason why it is important to prevent intruders will be pointed out to help understand why network security is vital for many businesses.
As organizations around the world rely heavily on computers for all their information storage and processing, unprotected computers and networks can be an easy means for anyone to obtain this information. Also as organizations become increasingly dependent on computers and networks to run the business any damage can cause numerous problems for a business with possible costs within the millions. (Fitzgerald 1-7)
These costs are caused by the inability to use computers therefore affecting productivity and sometimes causing the complete inability to run the business. As computer systems assist heavily in running businesses and store many f the organizations private data it is easy to see why organizations need to secure their computer systems or it will cost them.
Passwords is a relatively easy and cheap ...
Download paper
Not exactly what you need?

Related papers

Security and privacy in e-commerce
Whenever a user travels the cyber space, (s)he leaves his/her identity at almost every step of the way (Privacy Rights Clearing House, 2006). Whether one is signing up for internet service with Internet Service Provider (ISP), sending emails, browsing internet sites, or using a search engine to locate required information, the identity of the machine is being shared, and it can be misused by…
6 pages (1506 words)
Privacy, Security in the 21st Century
Others, however, find even the old surveillance technologies to be disturbing. The ubiquitous security surveillance camera, for example, still has the power to stir controversy; witness the post-9/11 reaction to the National Park Service's plan to put round-the clock security cameras in the national parks within the nation's capitol (DeBose 1). For those people concerned with any new-found…
2 pages (502 words)
Information Security Master Essay
IT security policies in the private sector are also reviewed.…
42 pages (10542 words)
Security and Privacy in the Network Context
This Virtual Private Database feature controls access to individual row in the database. It works by dividing the database for use by diverse type of users and keep it secure from illicit access.…
3 pages (753 words)
Customer Information Privacy
It is indisputable that no confidential information concerning the customers and their buying behavior should be disclosed to other businesses either for consideration or otherwise. The CNET News reports that companies like, Toysmart and have tried to sell their customers' data (phone number, home address and credit card number) to other business entities (Sandoval, 2000).…
2 pages (502 words)