StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information Security of Business - Term Paper Example

Cite this document
Summary
The author concludes that as more and more businesses are going online, the need to protect the company’s network from attacks is greater than ever. A large amount of high-tech information passes to and fro among all the members of the supply chain like customers, suppliers, etc. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.3% of users find it useful
Information Security of Business
Read Text Preview

Extract of sample "Information Security of Business"

Download file to see previous pages

Information security essentially requires that the genuine parties to a transaction are identified, the actions they are allowed to perform are determined and their actions are limited to only those that are necessary to initiate and complete the transaction. Anything beyond that means that an intrusion attack is taking place. A new technology that has come up to secure information is the use of "tokens". A token is a form of two-factor authentication whereby the user needs a combination of something he knows for e.g. a password and something he has e.g. a token, to log on to a system.

Tokens come in various shapes and sizes and they are mainly of two types; "passive tokens" are storage devices that contain a secret code that allows users to gain access to a network, whereas "active tokens" are usually small stand-alone electronic devices that generate a one-time password that is only useful for a single log-on and the user logs on to the system using this one-time password. Currently there are 20 vendors who are involved in the marketing of these handheld devices and the price ranges from $30 to $100 per unit.

Companies wanting to use this technology can choose anything that serves their need and purpose because it can be customized and costs accordingly. However, four vendors are the market leaders because their products are sold the most; three vendors have the token device the size of a small calculator with a keyboard and use a 'challenge response' strategy. The fourth vendor supplies a device that is the size of a credit card and operates on a random number basis. Tokens are becoming increasingly popular among major companies today because they provide a very good and reliable solution to safeguard information.

Over the years, companies have tried various means by which the network and information of the company would remain safe and not get in the wrong hands. However, more often than not, expert hackers have managed to break in and damage the whole network of companies. As a result of this, companies have faced enormous amounts of losses and experienced damages beyond repair. 

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Information Security of Business Term Paper Example | Topics and Well Written Essays - 750 words, n.d.)
Information Security of Business Term Paper Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1526401-information-security-college-essay
(Information Security of Business Term Paper Example | Topics and Well Written Essays - 750 Words)
Information Security of Business Term Paper Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1526401-information-security-college-essay.
“Information Security of Business Term Paper Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1526401-information-security-college-essay.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security of Business

IT Governance and Law

Traditional CRM systems have been promoting the business arena for a number of years now.... omized particularly to each business' needs CRM systems not only manage data but also result in the overall analysis and prosperity of sales figures.... A new class of customer relationship managers has emerged that focused specially the business of offering financial services.... information systems are one of the most cherished of inventions of the modern times....
13 Pages (3250 words) Report

Information Security Management System in Business Organizations in Saudi Arabia

Research Proposal: information security management system in business organizations in Saudi Arabia Abstract Information is considered to be an important asset for any business organization in the modern competitive world.... It is due to these reasons that the information security management systems have become vital for organizations.... The paper will evaluate the status of the integration of information security in the organizations and the reasons for minimal adaptation of the respective system in the region....
6 Pages (1500 words) Thesis Proposal

Information Security as One of the Major Concerns of Business

The paper "Information Security as One of the Major Concerns of business" states that one of the current and best security management procedures is the establishment of sophisticated encryption method to better protect the business and customers' details.... This report addresses the information security-related concerns for H4 Corporation.... In this scenario, the business could not gain customer confidence for a long time.... In response to such a security breach, the business engaged a number of security specialists, who recovered the crashed data servers....
8 Pages (2000 words) Research Proposal

How to Achieve Business Information Security in Cyberspace

Through establishing a secure platform and privatizing access to the vital information, security may be boosted within a cyberspace to accord secure business performance.... The achievement of a secure platform to conduct the business provision has been placed in confidentiality and providing a secure software to conduct the business.... Conclusion The leading threat to completion of secure channels within the business provision has been noticed in access to the system....
3 Pages (750 words) Essay

Information Security for Small Businesses

Title: information security for Small Businesses information security The advancement in the field of computers has carried mankind to another level.... It is also vital to ensure that information security measures are updated regularly to stop any intruder from taking advantage of any obsolete protection software (which is often noticed in small organizations).... Alongside financial losses and reputation damages, ineffective information security measures are also likely to instigate legal actions and investigations against organizations....
4 Pages (1000 words) Research Paper

Important certifications / Eight types of people responsible for security

In this scenario, this certification programs generally offer common principles for maintaining Information Security of Business assets such as information systems or networks.... hellip; There are a large number of information security certification programs that are designed to test the knowledge of information security professionals in specific areas.... In their book, (Merkow, 2006), a number of information security certification programs such as International Information Systems Security Certification Consortium (it is useful for all kinds of information security professionals) and certified information system auditor....
3 Pages (750 words) Research Paper

Security of Information in Business Organisations

But loopholes for leaking of business information into unintended audience constitutes complex intertwined counterparts including the technology itself (Dhillon 2003), mismanagement of data and distrust between the management and the workers from a major viewpoint among others (Ardichvili & Page, 2003).... The major purpose is to give an analysis of different forms of threats and risks in general and suggestions to solve problems of business information insecurity (Torkzadeh, 2006)....
14 Pages (3500 words) Essay

Security of Information in Commercial or Business Organisations

The effect of such threats on firms is potentially great because of the risk of financial loss and lack of business continence services.... … The paper “security of Information in Commercial or Business Organisations” is a forceful variant of literature review on information technology.... The paper “security of Information in Commercial or Business Organisations” is a forceful variant of literature review on information technology....
15 Pages (3750 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us