IT Security - Essay Example

Only on StudentShare

Extract of sample
IT Security

There is a long line of self-interested intruders ready and willing to capture this valuable data, and as our reliance on digital information has grown, so have the threats. Large concentrations of data, mobile devices, and the need to keep the data useful has all added to the vulnerability of our information technology. While our information system has worked to make our data more secure, the threats of attack and the divulging of information has become ever more prevalent. Information security is an ongoing process that can never quite meet the challenge of the security threats.
Security threats originate from three sources. There are internal threats from corrupt employees, external threats that originate from external attacks on the system, and system failure. While direct attacks may compromise the data, system failure can cause a loss of information or system shutdown. While developing a system of access control minimizes attacks, system failures are dealt with through a system of redundancy and audit tracking. These systems are open to compromise by direct attack or well meaning employees that practice lax security measures.
The security of a database or network often begins with access control. At the system level this may mean the use of passwords. Passwords are easily compromised and are often shared for the purposes of convenience. ...
Download paper


Digital information is one of the most valuable and one of most vulnerable commodities in our society. Personal information can be attained by criminals to establish an identity at the victim's expense. Confidential personal and medical information can be compromised that may place people at risk of embarrassment or loss of a position…
Author : hudson94

Related Essays

Information Security
There is also a vast body of empirical evidence that demonstrates that general managers ought to be much more involved in the formulation and implementation of information security because they are more able to assess particular types of risks, more attuned to cost-benefit considerations, and better able to integrate information security into a business organization's larger structure than narrow-minded security specialists (Lacity, 2005). In order to more clearly elaborate how organizations should approach information security issues, this essay will discuss how businesses should strike a...
4 pages (1004 words) Essay
Network Security College Essay
The internal vulnerabilities are to be countered so that possession of one is not used by the other....
2 pages (502 words) Essay
Security Organization
Later investigations revealed that it was an insider incident, involved the theft of subsequent selling of patients' credit card numbers, and that the activities emanates from the Call Centre. Having provided you with a general overview of the situation, I will now explain its potential and actual consequences, summarize the results of the post-mortem and clarify both lessons learnt and future action....
6 pages (1506 words) Essay
Data Protection Act impact on Security on Canada (IT Security)
It is necessary to ensure that every organization’s foreign organization follows the same requirements that would apply for Canadian operations, if the information is being transferred for processing. This can be achieved by entering into a contract or legal agreement with the other party “and adherence to the agreement that the foreign organization must work by the requirements of the Act, the OECD is an instance of such agreements.” (http:/
5 pages (1255 words) Essay
Business Management Technology Literature review: IT security Management
Even computers and its software are very costly. And the data stored in the computer is more important and costly compared to the computer cost. So management and the employees who are working in the IT system should have a clear awareness about the importance if IT security management in business. The purpose of IT security management is “protect the company’s information assets from all threats, whether internal or external, deliberate or accidental, to ensure business continuity, minimize business damage, and maximize return on investments and business opportunities.” (Information...
6 pages (1506 words) Essay
E-Commerce and IT Security
initial forms, cell phones had specific and limited operational potentials; today cell phones have development a lot in order to respond to their new role as a primary mode of communication – an indicative example is the BlackBerry, a cell phone with advanced capabilities – for instance the Organiser or the GPS (referring to the Smartphone features, see the firm’s website); on the other hand, the fact that mobile phone has become the primary mode of communication has led to another problem: the social life of people takes new forms; the isolation of individuals is promoting; in this...
10 pages (2510 words) Essay
It is also reflective of how law, crime and morality are perceived by members of the society. The security practices of removing concealments from the sidewalks to protect people who travelled the highways from being attacked by robbers could not work alone. Other attempts to deal with crime at the local level proved futile and so night watches and patrols which were established privately was the means of protection for citizens....
7 pages (1757 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!