This website uses cookies to ensure you have the best experience. Learn more

Importance Of Information Security Essay

1666 words - 7 pages

Information security
Information Security refers to the procedures and techniques which are composed and implemented to ensure print, electronic, or other form of private and sensitive information from unapproved access, utilization, destruction, divulgence, change, or interruption. (http://www.sans.org/information-security)
Need for Information security
Business objectives and privacy drive the need for Information security. For a period, data security was affected to some degree by trepidation, lack of determination, and uncertainty. Examples of these impacts included the fear of another worm episode or virus attack. But regardless of the security suggestions, business needs needed to come first. (http://www.ciscopress.com/articles/article.asp?p=1998559)
Threat
A Threat is a potential peril to data or systems. (http://www.ciscopress.com/articles/article.asp?p=1998559)
Threat vectors
Social engineering: Social engineering takes another importance in the period of social networking. From phishing strike that target social network records of prominent people, to data exposure because of absence of law or policy, social networks have turned into a focus malicious attackers.
Smart phone exploits: The operating systems on consumer electronics are a choice of decision for high-volume strike. The multiplication of applications for these devices increased the issue.
Memory scraping: This procedure is aimed at getting data specifically from volatile memory. The strike tries to exploit systems and applications that leave hints of information in memory. Attacks are particularly aimed at data that may be prepared as decoded in volatile memory.
Hardware hacking: These attacks are aimed at exploiting the hardware architecture of specific devices. Attack methods include bus sniffing, changing firmware, and memory dumping to discover crypto keys.
Virtualization exploits: Device and service virtualization add more unpredictability to the system. Attackers are progressively focusing on virtual servers, virtual switches, and trust connections at the hypervisor level.
Website compromises: Malicious attackers compromise prominent sites, making the sites download malware to interfacing clients. Attackers typically are not intrigued by the information on the site, yet utilize it as a springboard to taint the clients of the site.
(http://www.ciscopress.com/articles/article.asp?p=1998559)
Factors affecting potential threat vectors
It includes organization’s environment, including its business technique, information systems, policies and procedures, clients, facilities and equipment. Each of these components will affect potential risk sources, their motivation, strategy, and consequences.
Different Threat classification databases
To aid in improving security all around the security lifecycle, there are a lot of publicly available classification databases that give an index of attack patterns and classification taxonomies. They are pointed at giving a predictable...

Find Another Essay On Importance of Information Security

The Importance of the Chief Information Officer

1691 words - 7 pages administrative functions. Former Chief Information Officer of NHS UK revealed in his article that Chief Information Officers have many concerns aside from developing IT for an enterprise. A Chief Information Officer can be burdened even by issues such as cost-cutting, leadership, security issues, satisfying customers, managing change and even organizational politics especially for government agencies (McGinn, 2007). This just demonstrates exactly how

The Importance of Information and Communications Technology

935 words - 4 pages The Importance of Information and Communications Technology Information and communications technology (ICT) is generally regarded as the overlap of computer information and telecommunications technologies, and their applications. In this document the term ICT is used to indicate the whole range of technologies involved in information processing and electronic communications, including the internet, electronic mail and

Protection of Information: One of the Internet Security topics

1656 words - 7 pages security level of information systems.In the current situation, data processing has moved the problems of information security forward to the rank of most important problems of national economy. Solving the problem of poor information security presupposes a complex of measures. First of all, such actions of government as development of classification system, documentation of information and protection methods, data access regulations and punishing

An Integrated System Theory of Information Security Management

678 words - 3 pages 1.0 Introduction Nowadays, information can be classified as valuable than gold because of the effectiveness evidence rather than nonsense word. According to the authors, security is to combine systems, operations and internal controls to ensure the integrity and confidentially of data and operation procedures in an organizations. To ensure the information is under control, IT specialist was created. Many people can access internet without any

An Evaluation of Information Security and Risk Management Theories

2183 words - 9 pages a consideration of the challenges that arise from a lack of research. Theories The evolution and understanding of the importance of information security and risk management originates from the awareness for the potential of IT in business functions and as a business enabler. This was then followed by the realization that the risks brought about by this boundless facilitator must be appropriately understood and addressed. The essence of

The Role of "White Hat" Hackers in Information Security

2076 words - 9 pages individuals doing this work are hired by consulting firms after learning their skills as unpaid hackers. In some cases, consultants are hired to test or to supplement the work of a firm’s computer security staff. In other cases, consultants are hired because a smaller company cannot afford to keep computer security personnel on their Information Services payroll. The firms providing security consulting services come from various segments of the

Impact of the Internet on Information Technology Security

1185 words - 5 pages the "Information Highway." Even though it helps many businesses, the Internet also creates many problems for their infrastructure. Security is the reason Internet accessible environments changed how businesses function. Businesses are forced to exchange information differently. They must proactively protect and secure internal data and systems. To help this process, businesses in the 1980s started using TCP/IP to develop private Internets.Some of

The Deployment of Security Policy in Information Systems

1024 words - 5 pages can adopt these solutions techniques to eliminate the security vulnerabilities and misleading transactions. REFERENCES [1] Snene M., “Knowledge patterns of distributed information systems- the case of distribution design and implementation based on integrity constraints optimisation”, Ph.D thesis, N576, Geneva university, 2004. [2] Snene M., Pardellas J., Leonard M., “Information system architectures: where are we?”, Proceedings of the ICTTA

Information Security System: The Case of Target Corp

1105 words - 5 pages Nowadays, information security is one vital part of a company to develop and maintain its information system. As technology became more advanced in terms of creating and utilizing, the more threats a company’s information system will face. A threat is a person or organization that seeks to obtain or change data illegally, without the owner’s permission and knowledge. In addition, a vulnerability is an opportunity for threats to gain access to

The Deployment of Security Policy in Information Systems

1556 words - 7 pages , different security solutions have been presented and the best solution is to audit the database logs, actions on database and any alteration on the objects of database to avoid any data modification. Through revolution of information technology (rapid, vast technology) Database auditing implementation should afford the velocity and power full to monitor the database activities. Moreover, we are in a bottle neck, especially with the rapid

The importance of a comprehensive security policy for modern businesses

2140 words - 9 pages corporate management function as an important priority.The importance of IT security auditing is paramount in the organization. The risks involved in inadequate protection includes disclosure of business secrets to unauthorized parties, wrong information leading to wrong decision making, loss of access when required and decrease in competitive advantage. Hence, IT security audit with management support will lead to identification of threats in order to

Similar Essays

Importance Of Cyber Security Essay

2012 words - 8 pages the forefront of policy priority for legislative administration for several years, cybersecurity protection doesn’t fit into conventional or traditional security problems. As technology has advanced, so have risks and vulnerabilities on critical infrastructure. Malicious attacks are more sophisticated and the potential for a catastrophic failure has risen exponentially over the last decade. As we place more private information within the

Importance Of Border Security Essay

1166 words - 5 pages . The new visa system requires that all new applicants go through an interview and an extensive background check if deciding to travel, study, visit relative or conduct business in the U.S. Applicants must have secure documentation such as a passport or something of equivalency whether they are a citizen or noncitizen all are required to have such information. Another change over the years that has helped border security is the fingerprinting to

The Importance Of Information Literacy Essay

1207 words - 5 pages survey programme (ISSP): A tool for teaching with an international perspective. Teaching Sociology, 32(3), 304. Outing, Steve. (2007, Jul). It isn’t Easy Knowing Who You Can You Trust. Editor & Publisher. Presidential Committee on Information Literacy. (2009, Jan 10). The Importance of Information Literacy to Individuals, Business, and Citizenship. Washington, D.C. Presidential committee on information literacy: Final report. (2009, January). Zabel, Diane. (2012, Jan). A Reaction to "Information Literacy and Higher Education". Journal of Academic Librarianship, (30)1, 17(3).

The Role Of Information Security Policy

941 words - 4 pages Implementation of policies and standards within an organization are important to maintain information systems security. Employees within an organization play a huge role in the effort to create, execute, and enforce a security policy. Every business requires a different strategy and approach to it's security policy, depending on their size and nature of business. Security Policies An organization's security policy describes the company's