1- Information Technology (IT) Security
Vulnerability is the first word that come out when we talk about IT security. It implies the different measure a company has taken to render void of success any …show more content…
These type of backing up document should not in any regards restrict the company from keeping them in other environment such a USB keys or hard disks.
2- Information Security
Information security deals with the “information assets” of the company, “in whatever form and wherever they are kept” (E. Gelbstein, 2013). Information assets are something valuable that the company has to use. It implies that some managerial team in one area or the other will have to manage these crucial information. Confidentiality is thus required for such personnel because of the sensitivity of the information they carry.
An example for information security would be the Snowden case who happily handed over NSA files to some major newspaper, or the Private Manning issue who deliberately handed thousands of classified files to the owner of the famous online site WikiLeaks.
Another important aspect of information security is the very definition of classified files or information by a firm. According to (Eduardo Gelbstein, 2013,), some firms take the “easy” route of rendering everything sensible. I believe it is inefficient as it will slow down the working progression. Imagine that any bit of information need approval before …show more content…
Furthermore, apparels have gained in conciseness and it has become a challenge to inspect all elements leaving the company. That is where the professionalism of the guard teams are essential, because they have to restrain any data or other equipment of the company to be taken out without the necessary approvals.
An example for enterprise security would be one taken form a local company I my country that is hit by terrorism, but also theft. CCVT are now installed everywhere as guards watch in the control room. Added to that, many corporate take advantage of the rising number of security firms to load their halls and entrances with these guards, who restrict in a large percentage all kinds of breach in the company’s they protect.
To conclude, I will say IT security, enterprise security and information security are three accountability information security and are essential and complementary for any company that want to protects its information as well as those of their clients. They can be dissuasive as the physical enterprise security, preventive like the information security, and curative like the IT security.