Information Security Essay

2915 words - 12 pages

Information Security
As the world migrates to the digital village, a lot of digital data and information is generated and transmitted. In the same line, there is a growing need for data repositories or data banks. Information security is chiefly concerned about prevention, detection and response to computer threats or risks (CISCO, 2013). Protecting organizational information and systems is a daunting task because of the emerging and advanced threats to information technology resources. Securing information technology infrastructure and informational assets is a continuous cycle as advancements in technology presents a new breed of threats (Hunt, 1998).
In the current business landscape, accounting systems are typically modules of web-based Enterprise Resource Planning (ERP) systems (Laudon & Traver, 2009). As much as they are core operational areas of any organization, they need to be interconnected seamlessly with other operational areas like transport and procurement to meet the growing demands of real-time operations. With this in mind, customer experience, productivity and profitability of an entity must be achieved without compromising the information security of such critical modules. In this line, the concept of information security is directly linked to the productivity accounting systems. That is to say, for accounting data or information to have value and used to generate revenue, it must be safeguarded at all costs.
Since threats are constantly shifting, conducting information security audits on a continuous basis assist entities to ensure that adequate security controls and tools are up-to-date. Security audits reduce the security risk to an organization’s information assets and other interconnected systems, such as the accounting and human resources modules of an ERP (Wool, 2004). For instance, the Department of Homeland Security carries out continuous information security audits to ensure that integrity, confidentiality and availability of the homeland security enterprise data and services (Wool, 2004). Ensuring the security of financial systems is a continuous endeavor, considering the never-ending attacks from hackers - using advanced methods and tools; to access valuable information within organizations.
This research paper discusses software and hardware firewalls with reference to accounting systems.
Definition of firewall
A firewall is a software program or specialized hardware devices, designed to check information entering or leaving the network; and either blocking it or allowing it to pass through a node - based on existing security settings (Zwicky, Cooper, & Chapman, 2009). It can also be defined as a rule based program or device intended to allow network traffic to pass through while blocking unwanted traffic. Firewalls are usually placed between an entity’s network and the insecure public internet. They act as a first line of defense in opposition to unwanted traffic. In this respect, a firewall can help entities to...

Find Another Essay On Information Security

Information Security in Mobile Databases Essay

2068 words - 8 pages physical boundaries in such type of technology there is always a chance of information theft. Wireless connection is not the most secure type of connection. So with mobile database come more security issues to be dealt with. CONCLUSION Mobile devices seem to be dominating the world of technology and it surely will be the future of data communication. With the advancement in mobile technology there is a good chance that mobile

City View's Information Security Plan Essay

2137 words - 9 pages shelve systems. As it may be difficult for older employees to adapt at the change, City View should prepare employees by letting them know ahead of time what the changes will include and when them to be expected to in implemented. City View would have information secession on how to use it will help the employees manage the change (ref). 8 Security: It is important to safeguard the data collected because City View is reasonable for exchanging

Security Management Models for Information Systems

1014 words - 4 pages Background Security management within the context of information systems “needs a paradigm shift in order to successfully protect information assets” (Eloff & Eloff, 2003). Due the rapid increase in information security threats, security management measures have been taken to proactively remedy the growing threat facing information security. As a result of this, security management “is becoming more complex everyday, many organization’s

Information Security in America and Sweden

1583 words - 6 pages Introduction: Business today retains a variety of problems, a major one of these problems are breaches in information and consequently society has come up with Information security to help secure peoples privacy. In order to understand why we have information security, one has to first apprehend the value of information. Typical information stored by different businesses and individuals will consist of an assortment of hypersensitive

Security for Information Technology: Return on Investment

620 words - 2 pages Return on Investment (ROI) is a common issue among corporate management. The question can seldom be answered to everyone's satisfaction. It is especially harder to answer in the information security context where a lack of data makes it difficult to quantify what exactly security spending earns.The management knows the threat is there but they do not feel the threat. In other words, they cannot justify the spending as they do not have a clear

Controls to Diminish Information Security Risks

2320 words - 9 pages Information Event Manager (SIEM) SIEM is a methodology to security management that endeavors to offer a complete view of the company’s IT security (AlienVault, n.d.). SIEM combines SIM (security information management) and SEM (security event management) methods into a single security management system (AlienVault, n.d.). The SIEM offers a dashboard view of all of the distinct security components (AlienVault, n.d.). The SIEM presents analysis of

The Internet's Impact on Information Technology Security

1408 words - 6 pages global network relentlessly. As a comprehensive overview of the Internet's adverse impact on information technology security is beyond the scope of this paper, the following analysis will examine some of the issues many organizations currently face in securing their networks from pervasive and relentless Internet-based attacks.Network SecurityBy enabling Internet connectivity, organizations have opened their internal networks to various common

Biometrics Introduction to Information Systems Security

622 words - 2 pages proliferation of mobile devices with fingerprint readers. No technology is failed safe. Biometrics is continuing to be developed. Multiple technologies carry the benefit of preventing security gaps and leaks. Biometric devices are getting smaller, accurate and more sophisticated. Multimodal applications are being developed to assist in identification and verification (Philips, 2002).Biometrics can provide security at ports and access points. They can help

Impact of the Internet on Information Technology Security

1185 words - 5 pages the "Information Highway." Even though it helps many businesses, the Internet also creates many problems for their infrastructure. Security is the reason Internet accessible environments changed how businesses function. Businesses are forced to exchange information differently. They must proactively protect and secure internal data and systems. To help this process, businesses in the 1980s started using TCP/IP to develop private Internets.Some of

An Evaluation of Information Security and Risk Management Theories

2183 words - 9 pages An abundance of information security and risk management theories are prevalent; however, it can be difficult to identify valid and applicable theories. In the reading to follow, several information security and risk management theories are evaluated. These theories are presented and employed via various frameworks, models, and best practice guidelines. An assessment of sufficient research pertaining to these theories is addressed, along with

Protection of Information: One of the Internet Security topics

1656 words - 7 pages security level of information systems.In the current situation, data processing has moved the problems of information security forward to the rank of most important problems of national economy. Solving the problem of poor information security presupposes a complex of measures. First of all, such actions of government as development of classification system, documentation of information and protection methods, data access regulations and punishing

Similar Essays

Information Security Essay

1354 words - 5 pages IT securitySometimes referred to as computer security, Information Technology Security is information security applied to technology (most often some form of computer system). It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory. Such devices can range from non-networked standalone devices as simple as calculators, to networked mobile computing devices such

Information Security Credentials Essay

1389 words - 6 pages Credentials of Information Security Professionals: A summary of the various types of certificationsThe purpose of this document is to provide a summary of the various types of certifications available to information security professionals. A credential is best defined as a proof of qualification, competence, or clearance that is attached to a person, and often considered an attribute of that person. It is necessary for information security

Ethics And Information Security Essay

1074 words - 4 pages Ethics and Online Source Information What is Ethics? In my opinion, ethics give people free will to make right choices. People have free will to make choices that are governed with responsibility, accountability, and liability. We have a responsibility to perform in an ethical manner and be accountable for our choices or actions. Regardless of the circumstances and choices we make, there are consequences if we make the wrong choice. The

Information Security: Security Acts And Effectiveness

2438 words - 10 pages rely and have increasingly become reliant on technology to conduct business operations (Herath, Herath, & Bremser, 2010). Consequently, security measures are necessary to protect organizational information from both inside and outside entities of an organization. The protection and security of organizational information is under constant threat and mitigation measures are necessary to ensure information is protected from unauthorized users