Nt2580 Unit 7

Decent Essays
Written Assignment – Unit 7- Ecommerce
________________________________________
Submit a written paper which is at least two pages in length, double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. After referring to Chapter 3 of Information Security for Non-Technical Managers, discuss the three main areas of accountability regarding information security. When discussing each area, provide an example from outside the textbook.

Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room. We are going to talk about three main areas of accountability concerning Information Security.
…show more content…
In any location of business, there is a security system agency which takes in charge all information and physical controls of the local administration and associated rooms. As it is said by other writers, some businesses do not have physical security and someone responsible for it. This kind of security is related to having a control tower where someone: a guard, is available at this post, it is like a radar operating just to control coming enemies. All these is for areas like big buildings of factories, or campus for soldiers like Police Academy, etc. This is a function with tools/gadgets like micro-cameras, movement-sensor, heat detector, etc. There is panel control where a unit/equip is available in front of their cameras and other apparels to diagnose and give disposable information about the concern. Most often, this kind of security is to ensure that sensitive areas can only be accessed by authorized persons only, they control the equipment, data, electronic information of the organization from breaching or any other violence.
D.B Parker proposed three additional elements for Information Security: Firstly, we have authenticity which accounts on the veracity of the information stored by the control or the website manager. It ensure that the members registered in the organization are who they state to be. We have possession and control, this is the control of the documents and all information saved in a computer or on a chip with encrypted code or information. And the Utility, which is the availability to use the stored

Related Documents

  • Decent Essays

    Nt1330 Unit 2

    • 280 Words
    • 2 Pages

    1. What does the floor look like? Some food craps and foot prints are on the whitish-brown flooring. 2. What’s on the menu?…

    • 280 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 5

    • 541 Words
    • 3 Pages

    The Haswell microarchitecture improvises the Ivy-bridge in the following ways: • New socket LGA1150 for desktop processors • New AVX2 Instruction set • New TSX Instruction set • New bit manipulation instructions • New dispatch ports INSTRUCTION SET: The AVX instruction set limited the integer operations to use only 128-bit registers whereas the floating point operations used 256-bit registers. In addition, AVX2 implements three operand FMA instructions. New 15 bit manipulation instructions were added to support cryptography, indexing and data conversion. The third new instruction set is TSX which helps resolve data synchronization issues which arises when same data are used by different processes running at the same time.…

    • 541 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    These information systems are: • LAN – Switches, routers and firewall • Servers -- SHGTS Microsoft Access 97 database, Remote access server (RAS) • Workstations • Communication network – Phone and IP phones • Agency data processing center including its operating systems and utilities • Tactical radio network • Shared information processing service facilities (Bowen, Hash, & Swanson, 2006). A5: IT infrastructure that includes a description of information flow JINX application server is housed in room 1234, located at the HBWC’s executive office facility. This is a Microsoft Windows NT application server that is customized to run several applications including Microsoft Access 97 database that is used specifically for SHGTS. The database tracks all data and activities related to the grant distribution, grant users access the database to complete their grant…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In general, intellectual property ethics involves fair treatment, moral obligation to reveal the originator, and the compensation of the work. Company employee’s intellectual property ethics includes the following (Global Ethics Solution): • Protecting the company’s intellectual property and act responsibly with the sensitive information of vendors, customers, contractors, and other business partners. • Using confidential information only for the purpose for which it was intended. • Sharing confidential information only with employees who need it to do their job. • Clearly identifying all email communications with confidential markings.…

    • 818 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Office of Personal Management was established by Theodore Roosevelt is considered to be the father of the cutting edge merit-based administration. Merit is a term which means the value of quality of something or someone. Merit selection ensures that selection is based only on a person's ability to perform the work. Merit selection aims to choose the best person for the job, resulting in a quality workforce. OPM's history, which started with the Civil Service Act in 1883 and formally renamed to the Civil Service Commission.…

    • 1150 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Information Security Accountability The are three main areas of accountability when looking at the security of an organization. Whether is be a large corporation or a few person operation, each area to some degree is used by the organization. The three areas include I. T. security, information security and enterprise security (Gelbstein, 2013). I.T. security is security in place that protects an organizations information assets from non authorized person access in order to modify or remove.…

    • 410 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Privacy Ethical Issues

    • 934 Words
    • 4 Pages

    Introduction In this paper the author will be discussing Ethical issues in Information Systems. The issue that will be reviewed in Privacy and this author will express an opinion on privacy. Next this paper will identify two to three (2-3) human and technological protective measures that would be used as security safeguards and enforcement actions. Identify at least three (3) problems related to management information systems that may arise.…

    • 934 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    7/A. P2: Explain the principles of information security when protecting the IT systems of organizations 7/A. P3: Explain why organization must adhere to legal requirements when considering IT system Security. 7/AB. D1: Evaluate the effectiveness of the technique used to protect organisations from security threats whilst taking account of the principles of information security and legal requirements. Principles of information security…

    • 1392 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Database Security

    • 2041 Words
    • 9 Pages

    In all businesses and organisations, Databases are used to store all the core activities/information and often when there a major changes or restructure of the business the first process of many businesses is to change their databases to realign with their goal which makes them a valuable asset to any organisation. (Margulies, Pfleeger, Pfleeger 2015). Databases stores and maintain data at one central location so users can easily access it whenever needed. Through the use of Queries, databases have the ability to present data in multiple ways by linking data together for users to view and process vital information about their business and reports on performance throughout all departments (Knickelbine n.d.). Databases provide a fast and efficient…

    • 2041 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    There is a subtle difference between security and protection, we will perceive that both of them are extremely close concepts but still not the same. Protection is assured if one has all the necessary security measures as security itself is a type of protection to all the external hazards. Information is a treasure which is immensely worthy to an organization and thus it needs to be protected firmly. It is easy to corrupt, lose and steal thus the measures needed or taken to secure them from irrelevant entries are mentioned as Information Security. The significant step taken by most of the Organizations or firms recently is the use of ethical hacking process or techniques to evaluate the success or failure of their current security measures.…

    • 1032 Words
    • 5 Pages
    Improved Essays