Information Security Essay

Masters
Essay
Technology
Pages 20 (5020 words)
Download 0
There is a need for organisations to protect their databases because if every person can access it, then the company's competitors will have undue advantage over them. Consequently, the issue of information security arose so that organisations could protect this valuable information…

Introduction

It ensures that an individuals/ group's privacy is protected/ In addition, it protects the level of availability and integrity of the information. 2
There are numerous businesses today that place most of their information in computer systems. Hospitals, the military, the governmement and many other small enterprises use them. This information could be detrimental to the company if it was accessed by the public hence the need for information security. It is quite common to find that certain businesses usually have the names of their employees, their salaries, bank account details in their computer systems. On top of this, one may find that other firms place their client details, sales information and marketing information in their database. In the event that some of this information is lost, destroyed or compromised in any way, then the given company will be hampered from going about their daily operations. 3
It should be noted that software protection through virus protection or through imposition of firewalls alone cannot be enough to solve the information security problem. There should be set procedures and systems within any one given organisation that will facilitate the process of efficient data protection. 5
Information systems are distributed in three main parts. These are; software, hardware and communications. ...
Download paper
Not exactly what you need?

Related papers

Information Technology Master Essay
Information is one of the assets of an organization. Raw data until processed has no value in a business structure to be used in the best interests of the organization. With the advent of information technologies that raw data is gathered, stored, processed and disseminated to become an integral part of the organizations' processes. An information system links together data inputs, processes, and…
Management information systems Essay
As a means to increase competitive advantage, information systems have become an integral architecture in any organization's business processes. Organizations have adopted information systems in order to establish efficiency when it comes to the different areas of operations, ranging from the creation of system architectures that provide support for managerial decision-making through…
Information Security Essay
It ensures that an individuals/ group's privacy is protected/ In addition, it protects the level of availability and integrity of the information. 2…
Wireless Security Essay
You can simply use Laptop, PDA or Cell Phones to establish connection to each other via Bluetooth. These devices all give you the ability to "enter a network mobile which has many benefits for you. However, wireless networking has many security issues. Crackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into non-wireless networks."1 …
Information, Security & Control
They embarked on a R&D program to develop a suite of Internet based enterprise application software. These applications would work perfectly with Oracle databases. This eradicated the need to hold large numbers of databases on a client/server architecture since the delivery could be achieved through an Internet browser. Having developed the tools, Ellison took another of his great strategic…
Information Communication Technology Essay
Accessing information is very efficient by use of these means. The European commission affirms that the importance of the Information Communication Technology is not exactly the technology aspect of it but rather the capacity to increase the access to information and be able to serve all the populations that are underserved by these facilities. Many nations have come up with organizations that…
Information Security Risks
The information security requirements that these frameworks have is going to be researched and an attempt to assign it to the general categories of information security risks will be made, in order to facilitate an easier management…