StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Considering the Most Comprehensive Method of Handling Information Security - Research Paper Example

Cite this document
Summary
From the paper "Considering the Most Comprehensive Method of Handling Information Security " it is clear that cryptography may be defined as the process by which data is transformed into a form that cannot be used by any other person except the authorised user…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Considering the Most Comprehensive Method of Handling Information Security
Read Text Preview

Extract of sample "Considering the Most Comprehensive Method of Handling Information Security"

Download file to see previous pages

There are numerous businesses today that place most of their information in computer systems. Hospitals, the military, the government and many other small enterprises use them. This information could be detrimental to the company if it was accessed by the public hence the need for information security. It is quite common to find that certain businesses usually have the names of their employees, their salaries, bank account details in their computer systems. On top of this, one may find that other firms place their client details, sales information and marketing information in their database.

In the event that some of this information is lost, destroyed or compromised in any way, then the given company will be hampered from going about their daily operations.  It should be noted that software protection through virus protection or through the imposition of firewalls alone cannot be enough to solve the information security problem. There should be set procedures and systems within any one given organisation that will facilitate the process of efficient data protection.  Information systems are distributed in three main parts.

These are; software, hardware and communications. This implies that any sort of information security systems must be applied in the three realms. It must also be made in such a way that it cuts across the physical, organisational and the personal. Procedures and policies normally used for these systems are those ones that apply to computer operators, users and administrators. It should be noted that information security applies to all types of data; it may be electronic data, print data or even other forms.

Because of the wide aspect of information security, it has now become a career field on its own.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Considering the Most Comprehensive Method of Handling Information Research Paper”, n.d.)
Considering the Most Comprehensive Method of Handling Information Research Paper. Retrieved from https://studentshare.org/information-technology/1503801-information-security-essay
(Considering the Most Comprehensive Method of Handling Information Research Paper)
Considering the Most Comprehensive Method of Handling Information Research Paper. https://studentshare.org/information-technology/1503801-information-security-essay.
“Considering the Most Comprehensive Method of Handling Information Research Paper”, n.d. https://studentshare.org/information-technology/1503801-information-security-essay.
  • Cited: 0 times

CHECK THESE SAMPLES OF Considering the Most Comprehensive Method of Handling Information Security

Infrastructure for Data Storage

In order to store data for the computer system, the DAS is the most well-known method.... This paper “Infrastructure for Data Storage” demonstrates the options for data storage and technology.... Likewise, Direct attached storage and network area storage is discussed in detail....
4 Pages (1000 words) Essay

Searching Compatible Theory

Because of the usage of game theory, there are certain security decisions.... These security decisions are supportive in terms of the distribution of restricted resources, the stability of professed problems, and consideration of core inducement mechanisms.... According to Cavusoglu, Raghunathan & Yue (2008), Decision theory is weak in handling the challengers' worked out strategies and revisiting of defender's actions because as per the theory, the defender regards the challenger's devised performances as 'exogenous'....
7 Pages (1750 words) Report

The Development Information Security

Consequently, this ever-increasing security threat has led to the development of numerous information security standards.... This security framework provides steps to establish best suited information security Management System (ISMS) for SMEs.... This essay describes increasing trend of digitized information, globalization of markets and resources has accelerated the incident of data loss and security issues.... hellip; security risks for large, small or medium enterprises are alike....
25 Pages (6250 words) Essay

The Preparedness of the Healthcare System to Handle Epidemic Infectious Diseases

The epidemic indicated that the world is unprepared with regard to handling highly infectious diseases properly.... It is therefore important to determine the level of preparedness of the health care professionals with to the handling of infectious diseases.... Furthermore, the level of preparedness of the health care sectors in handling infectious diseases determines the morbidity and mortality rates of... considering that some of these viruses inhabit the human body for a long period before the manifestation of symptoms, it is possible that individuals can carry and infect others with the viruses as they travel....
10 Pages (2500 words) Essay

Israeli Private Military and Security Companies in Defence against Terrorism

The paper "Israeli Private Military and security Companies in Defence against Terrorism" discusses that the data collected will be professionally analysed by dissecting the evaluation process into two stages.... PMSCs are presently the reincarnation of mercenaries, privateers, and corsairs that provided physical force and security in the 19th and 21st century (Pattison, 2014; Chesterman & Lehnardt, 2007).... As PMSCs provide specialized security that resembles the services of the military, the Israel government's decision to outsource military functions to the private security company was condemned (Schooner & Swan, 2012)....
10 Pages (2500 words) Research Proposal

How Information Can Be Used Efficiently in Golden Fleece Hotels

nbsp;In our hotel business, recording daily customer reservations, facilities and overall customer handling information are really necessary.... This paper gives an answer to questions “how information can be used efficiently in our organization”.... In this scenario, the author assesses the vital needs of business information at Golden Fleece Hotels.... hellip; Lillrank (2003) stated that for the purpose of analyzing business information we check the quality of the business data and information according to the intrinsic quality parameters....
12 Pages (3000 words) Case Study

Information Technology Security Risk

This research will begin with the statement that threats are defined as the probable network security breach which may occur in the future and will harm the network, as well as Information systems.... They explore opportunities for security breaches to cause confidential data invasion via unauthorized access, amendment of data, removal of information from information systems.... Vulnerabilities can be distinguished as security loopholes in the system....
13 Pages (3250 words) Research Paper

Network Security's Role

References 24IntroductionNetwork security is not normally the centre of proficiency for most enterprises and they probably do not have the time or satisfactory resources to provide the essential requirements.... The absence of effective security 6.... References 24IntroductionNetwork security is not normally the centre of proficiency for most enterprises and they probably do not have the time or satisfactory resources to provide the essential requirements....
17 Pages (4250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us