StudentShare solutions
Got a tricky question? Receive an answer from students like you! Try us!

Essay example - IT Security

Only on StudentShare
Pages 4 (1004 words)
Digital information is one of the most valuable and one of most vulnerable commodities in our society. Personal information can be attained by criminals to establish an identity at the victim's expense. Confidential personal and medical information can be compromised that may place people at risk of embarrassment or loss of a position…

Extract of sample

There is a long line of self-interested intruders ready and willing to capture this valuable data, and as our reliance on digital information has grown, so have the threats. Large concentrations of data, mobile devices, and the need to keep the data useful has all added to the vulnerability of our information technology. While our information system has worked to make our data more secure, the threats of attack and the divulging of information has become ever more prevalent. Information security is an ongoing process that can never quite meet the challenge of the security threats.
Security threats originate from three sources. There are internal threats from corrupt employees, external threats that originate from external attacks on the system, and system failure. While direct attacks may compromise the data, system failure can cause a loss of information or system shutdown. While developing a system of access control minimizes attacks, system failures are dealt with through a system of redundancy and audit tracking. These systems are open to compromise by direct attack or well meaning employees that practice lax security measures.
The security of a database or network often begins with access control. At the system level this may mean the use of passwords. Passwords are easily compromised and are often shared for the purposes of convenience. ...
Download paper
Not exactly what you need?

Related papers

Internet Security Essay
In this report, section one will throw light upon two main problems that may usually affect a computer without security: hacking and viruses. The next section will compare two different types of security programs that can be used to protect the computer. The last part will discuss the advantages and the disadvantages of the proposed solutions in this paper.…
4 pages (1004 words)
Information Security Master Essay
IT security policies in the private sector are also reviewed.…
42 pages (10542 words)
Information Security
There is also a vast body of empirical evidence that demonstrates that general managers ought to be much more involved in the formulation and implementation of information security because they are more able to assess particular types of risks, more attuned to cost-benefit considerations, and better able to integrate information security into a business organization's larger structure than…
4 pages (1004 words)
Network Security College Essay
The internal vulnerabilities are to be countered so that possession of one is not used by the other.…
2 pages (502 words)
Security Organization
Later investigations revealed that it was an insider incident, involved the theft of subsequent selling of patients' credit card numbers, and that the activities emanates from the Call Centre. Having provided you with a general overview of the situation, I will now explain its potential and actual consequences, summarize the results of the post-mortem and clarify both lessons learnt and future…
6 pages (1506 words)