IT Security - Essay Example

Only on StudentShare

Extract of sample
IT Security

There is a long line of self-interested intruders ready and willing to capture this valuable data, and as our reliance on digital information has grown, so have the threats. Large concentrations of data, mobile devices, and the need to keep the data useful has all added to the vulnerability of our information technology. While our information system has worked to make our data more secure, the threats of attack and the divulging of information has become ever more prevalent. Information security is an ongoing process that can never quite meet the challenge of the security threats.
Security threats originate from three sources. There are internal threats from corrupt employees, external threats that originate from external attacks on the system, and system failure. While direct attacks may compromise the data, system failure can cause a loss of information or system shutdown. While developing a system of access control minimizes attacks, system failures are dealt with through a system of redundancy and audit tracking. These systems are open to compromise by direct attack or well meaning employees that practice lax security measures.
The security of a database or network often begins with access control. At the system level this may mean the use of passwords. Passwords are easily compromised and are often shared for the purposes of convenience. ...Show more


Digital information is one of the most valuable and one of most vulnerable commodities in our society. Personal information can be attained by criminals to establish an identity at the victim's expense. Confidential personal and medical information can be compromised that may place people at risk of embarrassment or loss of a position…
Author : hudson94
IT Security essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"IT Security"
with a personal 20% discount.
Grab the best paper

Related Essays

Manage IT Security for the London Olympic 2012 games
As a project manager, my key responsibilities in this project will include project scope management, time and cost management, quality management, human resource management, communication management, risk management and procurement management. Basic details of the London 2012 Olympics security measures and the potential IT security vulnerabilities of the event An assessment by the Olympic Strategic Threat Assessment (OSTA) indicates that the possible security threats to the Olympics are terrorism, serious crime, domestic extremism and natural hazards (Home Office 2012, 13).
6 pages (1500 words) Essay
IT Security Policy Framework
For instance people, procedures, business methodologies etc. this is also considered as mandatory for information security. The complete information security framework should include the following main characteristics (HITRUST): Recommended sound security governance practices (e.g., organization, policies, etc.).
4 pages (1000 words) Essay
An IT security consultant
Considering the exposure of most systems to multiple users through the internet, and environments such as the operating system, the vulnerability to attack increases, with unpredictable consequences in costs and damages (Zellan 2003). The attackers aim at gaining privileges, valuable information and control of the system.
3 pages (750 words) Essay
IT Security
Threats to these systems can be either directed at the information stored in the system itself or aimed at affecting the day to day operations of the organization (Bowen, Chew and Hash, 2007). Information security threats have made governments to enact information communications laws with an aim to set requirements and standards that an information system must meet to perform effectively.
4 pages (1000 words) Essay
Data Protection Act impact on Security on Canada (IT Security)
Organizations have to ensure that their foreign operations are carried out in the same manner as those used for their operations in Canada. In cases where there is disclosure of information to a third party outside Canada for processing, the
5 pages (1250 words) Essay
Business Management Technology Literature review: IT security Management
Some of them can be of confidential nature. Any type of the IT system failure will badly affect both the functioning and the goodwill of the company. Thus IT Security Management becomes
6 pages (1500 words) Essay
E-Commerce and IT Security
In this context, the transformation of cell phones to an indispensable tool of communication can be characterized as expected; cell phones today have become a necessity but the margins of their role have been expanded more than initially estimated. In fact, in their
10 pages (2500 words) Essay
Pros and cons of outsourcing IT security
It is through this need that the term outsourcing was coined (Lederer, 2008). Companies are currently hiring vendors to work on their customer care services and other programs
5 pages (1250 words) Essay
IT Security Policy Framework
For instance people, procedures, business methodologies etc. this is also considered as mandatory for information security. A complete security framework comes down to three well-known basic components: people, technology, and procedures.
4 pages (1000 words) Essay
IT Security
ecurity threats, the causes of such threats, as well as come up with appropriate recommendations on the best way for the company to overcome these security threats. The Managing Director expects this report from ESS in order to rectify the security challenges that her company,
9 pages (2250 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email