StudentShare solutions
Triangle menu

Information Security - Essay Example

Not dowloaded yet

Extract of sample
Information Security

It ensures that an individuals/ group's privacy is protected/ In addition, it protects the level of availability and integrity of the information. 2
There are numerous businesses today that place most of their information in computer systems. Hospitals, the military, the governmement and many other small enterprises use them. This information could be detrimental to the company if it was accessed by the public hence the need for information security. It is quite common to find that certain businesses usually have the names of their employees, their salaries, bank account details in their computer systems. On top of this, one may find that other firms place their client details, sales information and marketing information in their database. In the event that some of this information is lost, destroyed or compromised in any way, then the given company will be hampered from going about their daily operations. 3
It should be noted that software protection through virus protection or through imposition of firewalls alone cannot be enough to solve the information security problem. There should be set procedures and systems within any one given organisation that will facilitate the process of efficient data protection. 5
Information systems are distributed in three main parts. These are; software, hardware and communications. This implies that any sort of information security systems must be applied in the three realms. It must also be made in such a way that it cuts across the physical, organisational and the personal. Procedures and policies normally used for these systems are those ones that apply to computer operators, users and administrators. It should be noted that information security applies to all types of data; it may be electronic data, print data or even other forms. Because of the wide aspect of information security, it has now become a career field on it own. Some of the professions that fall under this vast topic include Information Systems Auditing, Digital Forensics Science and Business Continuity Planning. All these professions are associated with the protection of a company's business information. 6

Why information security is a problem
In the world of technological development much needs to be done to ensure that personal information is protected. This is because there are hackers; individuals who specialise in the entry of other people's computer networks. They are usually able to achieve this through the use of appropriate hardware. When hacking occurs, then a company faces the danger of loosing all their information. This normally occurs when the hacker has placed a virus in their computer system. Alternatively, hackers can gain access into a company's computer network and give away their confidential information. This is quite an alarming issue today because it only takes a matter of seconds before something like that can be achieved. Actually, the moment a given firm shuts down their security system for just one minute, hackers may gain access and obtain so much. 7

Information security is also a big issue these days because it may also be caused by dishonest employees within the company. Some workers may connive with other outsiders to get into their company's computer ...Show more

Summary

There is a need for organisations to protect their databases because if every person can access it, then the company's competitors will have undue advantage over them. Consequently, the issue of information security arose so that organisations could protect this valuable information…
Author : albertreilly
Information Security Essay essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Information Security Essay"
with a personal 20% discount.
Grab the best paper

Related Essays

Information Security
Information Security. Information is certainly considered as a significant benefit in the working of any corporation. In view of the fact that the data the gather, save and distribute everyday is the extremely description of their dealings with consumers and retailers, as well as the basis for their inner operations and business procedures.
4 pages (1000 words) Essay
Geographical Information Essay
The current hardware and software industries have been largely impacted by the advancements we have achieved in the Geographical Information technologies. The fast pace of innovations have demanded newer and faster products and applications (Industries n.d.).
5 pages (1250 words) Essay
How to Achieve Business Information Security in Cyberspace
Universal systems have been applied to complete performance within the IT technology and provide easier measures to offer solutions to the difficult situations within the society. These systems have witnessed security breaches that have limited the performance to a minimal scale and lead to inefficient results in goal achievement.
3 pages (750 words) Essay
Information Security Master Essay
This thesis is structured in three parts each with sub-divisions. In part 1 (2.0 -- 2.9), we survey and review Information Technology Policies and Acts of Congress, Presidential Executive Orders on IT , Office of Management and Budget (OMB) Circulars on IT.
42 pages (10500 words) Essay
Information Security
The objective data demonstrates a couple of points quite clearly. First, as noted by Angus, the organizations that decide to implement the strictest types of security are often much less secure than companies with more balanced approaches to security; he refers to this as a U curve in which a certain level of complexity generates too many costs and complications (2005).
4 pages (1000 words) Essay
Information Security College Essay
Passwords failed to serve the purpose because there is a tendency among individuals to keep a password that is very easy for hackers to guess, they have a habit of writing it down in easy to find places or of willingly telling people their passwords when asked.
3 pages (750 words) Essay
Information Law Bachelor Essay
Whilst it should be stressed that information in its absolute form does not amount to power; on the contrary it is the possession, use and control of this information that creates the enabling empowering environment. Conscious of this telling fact, civil society organizations brazed up to meet the rising challenges and prospects that comes with the possession of information in the citadel of political institutions has resulted in an ineffective imbalance between the political elite and the citizenry took up a massive campaign to reverse the trend; a product of this campaign has being the extension of these provisions to include the infamous Data Protection Act 1998.
7 pages (1750 words) Essay
Security Of Medical Records and Protected Health Information
While you may be tempted to shrug off those high-profile cases — thinking, "That couldnt happen at my facility" — the reality is tens of thousands of patient records have been compromised so far this year, according to the Privacy Rights Clearing-house, in breaches
5 pages (1250 words) Essay
Information Technology Security
Technology is shaping our world. It has become a part of everyone’s lives and it rules almost every action of ours. However, every new development has some merits and demerits. In this essay we
15 pages (3750 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation