This website uses cookies to ensure you have the best experience. Learn more

Intorduction To It Security Essay

1201 words - 5 pages

Introduction to IT Security (ITM 431)
Module #1 Case Assignment

The Oxford American Dictionary of Current English defines admonition as "to reprove. Urge. Give earnest advice to. Warn". Understanding this how do we employ admonitions systems to information technology to make it more useful in-regards to Network and system security? Using admonition software we are attempting to create an environment that will either prevent data from being in-advertently distributed across networks. Act as a deterrent to those trying to access the network illegally. Or warning users of the potential harm their actions may cause. In developing an IT security strategy, potential risks will need to be anticipated along with policies and procedures for the effective mitigation of these risks. There needs to be governing documentation that entails network design as well as security measures to safeguard the network from intrusion. Effective administrative procedures that ensure personnel are properly trained and continually advised of updates and/or changes to security.

In today’s world the collection, processing, and sharing of information has reached all time highs. It is because of this that the Internet as well as "IT Networks" occasionally referred to as "Intranets" need securing to protect from potentially harmful entities. The Handbook of Information Security Management tells us that there are a number of ways to identify, analyze, and assess risk. In developing a plan to secure a network there are many areas to focus on. One of them is risk, and the potential for risks should be addressed and plans and procedures developed to mitigate such risks. Risks can come in the form of external and internal threats.

Whether of a physical, logical, or social nature , a plan that will outline the company’s approach to risks that will affect security will need to be developed. Targeting key areas of the network and developing countermeasures to provide solutions to the potential risks. Taking into consideration all the elements of risk management, identifying, analyzing, and assessment of risks using admonition can play a part in answering some of the questions that can arise. Whether those questions concern network security or data security. A company can significantly mitigate the risk of adverse attacks to its network by developing and employing the appropriate security measures. Depending on the level of security needed, these measures should provide for monitoring of the network at all levels and be an on-going process. Reviewing the results of the monitoring will to keep systems administrators aprised of areas that may require added securing. Performing constant security tests and evaluating new and existing security components will ensure that the network will have the latest security programs in place. One of the main goals involing risk is the prevention of an unauthorized user the ability to gain access to the...

Find Another Essay On Intorduction To IT Security

Pentecostalism: The Temple of Freedom Under God

1219 words - 5 pages Mission, Michaux began once again to build a church, this time starting from a tent. It was here, in this tent, that one hundred and fifty people would come to accept the Lord as their Savior, and would join the Michaux family in becoming the foundation of the Gospel Spreading Church (GSC). After years of expanding the GSC, Elder Lightfoot, later established ten more churches in various locations, each of which would congregate under a

Secure Personal Data Servers: a Vision Paper

2711 words - 11 pages Secure Personal Data Servers: a Vision Paper 1. INTORDUCTION Nowadays, almost all companies and admirations are depending on storing data in central servers in order to make it easy for users to access their personal data. A huge amount of personal data is collected to servers in various fields such as hospitals, insurance corporations, organizations, etc. Because of the convent these servers provide, many people are requesting from internet

How Transport in the Modern World has Affected us as a People and our Surroundings

1895 words - 8 pages INTORDUCTION The introduction of steadily developing transport has created an expanding city with economic growth while creating a personal reliance on new technologies and the state. As transport options have been improving for individuals as well as the distributer, cities have adapted and grow side by side. Comparable to the growth of a city’s economy is the evolution of how a civilisation distributes itself with the convenience of increased

A Narrative Criticism of 1 Samuel 9:1-21

2269 words - 9 pages fullness, and it is the way that these are used in the narrative of 1 Samuel 9:1-21 to which we will now turn our attention. Identified in the NRSV translation of the Bible as the narrative in which “Saul [is] chosen to be King” we find in this text the first story of Saul’s call to kingship and the circumstances around it . Throughout this narrative, the author, or perhaps more accurately, editor(s) , evokes a number of literary features to build

The Relationship Between Gender and Language

2398 words - 10 pages The book An Intorduction of Sociolinguistics is an outstanding introductary book in the field of sociolinguistics. It encompasses a wide range of language issues. In chapter 13, Wardhaugh provides a good insight to the relationship between language and gender. He explains gender differences of language-in-use with concise examples. Wardhaugh riases questions about sexist language and guides readers to look closer at how people use language

The Importance of Communication and Teamwork Among the Flight and Cabin Crew

2018 words - 8 pages , teamwork, decision making, and task delegation. Through programs like CRM crews learn to work together as a team, and when they are working together it is less likely there'll be an accident. INTORDUCTION Background      The cause for most aircraft accidents (65%) are by crew error (FAA News, 1996). When the Crews performance level is low due to poor teamwork and communication this is when accidents happen. How can crew

Hospitality in The Hebrew Scriptures

2164 words - 9 pages To welcome the other, the friend or the stranger, is a fundamental aspect of human society, friendship, love and life. It is the intersection of two lives, an event that can fundamentally alter the paths of all those involved. This importance within the basic functioning of human life makes the recognition of hospitality as a central theme of the Hebrew Scriptures an unsurprising reality. With this in mind then, through this essay we will

Angela Davis and Feminism

1846 words - 7 pages looked at as a form of liberation. Davis stress that the feminist’s and abolitionist’s goal is to fight for against and redirect what is constitutionally considered as normal. Prisons have a stereotype that has certain definitions of what is normal. Yes it will take hard work to reconstruct the mindset of people to think outside the norm, but with struggle and consistent determination, it is possible. The freedom sexuality and sexual identity is a

The Role of Information Security Policy

941 words - 4 pages composition of the team that is in charge of determining said policy. Employees are a critical component to a successful security policy. Employees must fully understand the policy as well as have the motivation and accountability to adhere to it. Executive level employees are responsible for creating an awareness of why security policy is important. This leads to organizational buy-in, which is an essential tool for the organization to control

Human Security

1513 words - 7 pages organized crime . These growing threats and widespread fear and insecurities challenge individuals to attain peace for the development of the human race. When focusing on security, it is vital to know whose securities are affected. The focus of the security affects every individual, whether they differ in race, age group, nationality, religion, or gender. The notion of protecting its individuals and focusing on promoting peace and aid towards a

Security in the Business Environment

1919 words - 8 pages reliability of a supplier. This Security Management service management function (SMF) guides organization leaders and senior managers through issues that they should consider when developing an effective security policy and implementing it through a security program. The SMF discusses the individual and team security roles and their interrelationship with operational functions. The SMF also reviews tactics and best practices to increase staff

Similar Essays

Computer Security, Defines Encryption And Explain How It Is Used To Protect Transmission Of Information

886 words - 4 pages computer, minicomputer, microcomputers or some combinations?Ø What information technologies might be useful for this application?Some of the security issues, are consist of the level of security required and the cost involved in this conversion. A database system is vulnerable to criminal attack at many levels. Typically, it is the end user rather the programmer who is often (but not always) guilty of the simple misuse of applications. Thus

Policy Statement Of The Norweigan Point Of View Of The Security Council And Possible Reforms To It

2918 words - 12 pages countries together make up a 'security community'.Norway was not involved in the First World War because it was mainly limited to the Europeancontinent. It was a land war during which Norway was protected by the British fleet at the sametime as the German fleet was mainly held to its own naval bases.Norway was drawn into the Second World War as the result of a strategic German invasionundertaken as part of its war against England. This war was fought

"The Same Agency, Different Name" Assignment: What Are The Similarities In The Federal Civil Defense Administration And Office Of Homeland Security, And Why Was It Useless To Create The New Agency?

2062 words - 8 pages are also treated in detail (FEMA). Public service announcements, which are currently used to spread information to the population, are just like the civil defense films shown by the FCDA. These public service announcements are about the dangers of terrorism and ways to prepare just like the FCDA's films were about atomic bombs and ways to prepare for it. The Department of Homeland Security also recommended safety measures that could be taken in the

50 Year Vision Of Making Doha Competitive

1927 words - 8 pages appropriate and complementing it with world class design and integrating it with hospitality and transport facilities. Intorduction of museums art galeries Strategy in order to attain vision objectives The Spatial Vision provides a broad outline for the location scale and focus (residential, commercial and recreational) of future development and redevelopment to optimize of the various existing zones and the associated transport and infrastructure