StudentShare solutions
Got a tricky question? Receive an answer from students like you! Try us!

Essay example - Information security legislation

Only on StudentShare
Pages 19 (4769 words)
Presently, many financial services companies are realizing the need to expand the range of risk management and governance to incorporate information technology (IT). This realization is increasing in the wake of increasing theft occurrences and other information security violation, and also an increase of legislation intended to control financial markets and operational hazards exposures…

Extract of sample

Never the less, times have changed and the recent past has seen a lot of regulations and legislation which impacts information security. Some of these legislations are the European Data Protection Directive, Sarbanes-Oxley Act, and the Capital Adequacy Directive, just to mention but a few. In the event of these new compliance rules organization are being forced to resort a range of codes and standards to control their information systems. (Purtell, 2007)
Information security is an organization problem, and not a technologically one. With increasing spotlight on information security in legislation and the media all over the world, companies are being faced with a complex need to conform to privacy and security regulations and standards. This is making information security issues to be discussed in the boardrooms and many executives and directors becoming aware of their responsibility in ensuring information security in an organization. Information security is driven by;
The knowledge of issues and challenges being faced in information security currently has increased. Through, the government, the media, crimes, cyber attacks and proliferation of products that are vulnerable, information security has continued to receive more attention (Purtell, 2007)
Through successful attacks for example code red and Nimrod, c ...
Download paper
Not exactly what you need?

Related papers

Information Systems Security Incident
This paper describes the types of logs that are maintained at B-Concepts, the log management system and discusses the advantages of security logs.…
4 pages (1004 words)
Information Security Master Essay
IT security policies in the private sector are also reviewed.…
42 pages (10542 words)
Information Security
There is also a vast body of empirical evidence that demonstrates that general managers ought to be much more involved in the formulation and implementation of information security because they are more able to assess particular types of risks, more attuned to cost-benefit considerations, and better able to integrate information security into a business organization's larger structure than…
4 pages (1004 words)
Information Security and Privacy
Although there are several methods to prevent unauthorised access; users occasionally are able to get through the security systems, and it is therefore essential for organizations to also be capable f detecting intruders.…
6 pages (1506 words)
Information Security Awareness Construct
Therefore, perspectives and items that represent information security awareness should meet basic operational or user-level information security concerns. Organizational size should not differentiate among the information security concerns for desktop computer management, computer virus protection, and local-area-network issues. These types of information security concerns are applicable to basic…
5 pages (1255 words)
European Union Legislation
Currently, European social model has been directed toward new investments in the skills of Europeans so they will be able to compete more efficiently in national and global labor market. According to Barcelona European Council, sound social, policy is based upon several elements: economic performance, steadfast social protection and social dialogue. The welfare state should induce its citizens to…
5 pages (1255 words)