Assignment 1: Information Security Analysis

Improved Essays
Data security has become one of the most critical issues in security matters. It concerns nearly all institution and goes right to the privacy of many as people have an increasing level of various registration online. Amazon for example needs information such as bank or visa account number to be able to purchase. Such information is important and can be of critical value if it was in unwanted hands. Thence we are going in this paper to discuss about the three main areas of accountability, IT security, Information Security and Enterprise

1- Information Technology (IT) Security

Vulnerability is the first word that come out when we talk about IT security. It implies the different measure a company has taken to render void of success any
…show more content…
These type of backing up document should not in any regards restrict the company from keeping them in other environment such a USB keys or hard disks.

2- Information Security

Information security deals with the “information assets” of the company, “in whatever form and wherever they are kept” (E. Gelbstein, 2013). Information assets are something valuable that the company has to use. It implies that some managerial team in one area or the other will have to manage these crucial information. Confidentiality is thus required for such personnel because of the sensitivity of the information they carry.

An example for information security would be the Snowden case who happily handed over NSA files to some major newspaper, or the Private Manning issue who deliberately handed thousands of classified files to the owner of the famous online site WikiLeaks.

Another important aspect of information security is the very definition of classified files or information by a firm. According to (Eduardo Gelbstein, 2013,), some firms take the “easy” route of rendering everything sensible. I believe it is inefficient as it will slow down the working progression. Imagine that any bit of information need approval before
…show more content…
Furthermore, apparels have gained in conciseness and it has become a challenge to inspect all elements leaving the company. That is where the professionalism of the guard teams are essential, because they have to restrain any data or other equipment of the company to be taken out without the necessary approvals.

An example for enterprise security would be one taken form a local company I my country that is hit by terrorism, but also theft. CCVT are now installed everywhere as guards watch in the control room. Added to that, many corporate take advantage of the rising number of security firms to load their halls and entrances with these guards, who restrict in a large percentage all kinds of breach in the company’s they protect.

To conclude, I will say IT security, enterprise security and information security are three accountability information security and are essential and complementary for any company that want to protects its information as well as those of their clients. They can be dissuasive as the physical enterprise security, preventive like the information security, and curative like the IT security.

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    The security systems will be focused on management security, operational security and technical security controls. Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management. Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    4. CORRESPONDING DUTIES: As a user of the company network you have the following obligations: 1) To answer for your personal account granted to you by CRI company. 2) To keep confidentiality of company’s information, maintaining its integrity and keeping information from being accessed by non-authorized users.…

    • 1019 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    We store our information in a number of different ways… our electronic storage is fairly straightforward; the documents are saved within document folders that are given a relevant name to their use (e.g. “Admin…

    • 931 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Here are just a few of their essential systems that every business owner should consider: Safety & Optimization Systems: Detect-All…

    • 259 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    1. Purpose After several security incidents Greiblock Credit Union (GCU) Board of Directors needs a sound policy to address the situation. The main objective of this document is to improve the security culture of the organization. The specifications of this policy will address dynamic vulnerability analysis, intrusion detection, and incident response.…

    • 1879 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Nab Case Study

    • 957 Words
    • 4 Pages

    Confidentiality, get to and exposure: Access and utilization of the private data is constrained to business related assignments. Their inner frameworks must not be utilized to get to the individual profiles of workers. 12. Consequences of rupturing the set of accepted rules: A relationship in view of trust is critical.…

    • 957 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Data security breach occurs when unauthorized access to corporate systems is accompanied by loss of customer data, including financial data, credit card or bank account information, health data or company data such as trade secrets or intellectual property issue. Three examples are: ES Tsoft, where hackers stolen the personal information of 35 million South Koreans , RSA security in which approximately 40 million employee records were stolen and Sony’s PlayStation Network, which resulted in 77 million PlayStation Network accounts being hacked. The three companies may face attacks of spamming, phishing and social engineering, have learned about the theft afterwards and the breach would shake the customers’ confidence and the reputation of the…

    • 187 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Odds are that in one’s lifetime a consumer will be a victim of a security breach at some point. Data breaches are on the rise, and businesses need to ensure that they have sufficient security defenses in place to protect their data. Data breaches can have both direct and indirect financial consequences for a business. After a breach, businesses must resolve the problem leading to the breach, deal with the repercussions and come up with ways to limit risks in the future. When a security breach occurs in a business, it can have many negative affects on the business, such as negative press, loss of consumer loyalty, diminished brand reputation and even lawsuits.…

    • 855 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    A technological issue that a Chief Information Officer (CIO) may have to deal with in the company that they work for, could be a malicious user breaking into the company’s data systems. The CIO ethical approach should be a teleological system. The CIO should take a utilitarian type approach with the subtype called rule-utilitarianism because the CIO should also be thinking about the employees and customers that can be in harm from this critical issue. In addition, this issue can cause a huge impact, damaging the company’s confidentiality, integrity and, availability. It is important for the CIO to collaborate roles, policies, costs, and benefits in order to define the situation in the best way that the CIO can.…

    • 263 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The information that is stored electronically is physical and such information cannot charge under more traditional criminal’s statutes (John R). The internet fraud statutes included wire fraud, email fraud, money laundering and hacked passwords and it is passed by Congress in 1986. All of the online shopping websites and stores which are known as E-stores are using it to control and avoid all the external attacks to their vital information. This security control is also very helpful to reduce the vulnerabilities in database thus organizations can secure their data and information more easily. E-banking is also using the same security control to avoid E-banking crimes, because we know that all the banks are have online account access, that’s why this security control is easily securing all the vital information of the…

    • 773 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Security comes from privacy. A professional fulfilling the confidentiality rules will enforce appropriate restriction of private information as well as enforce security measures in order to maintain that privacy. When privacy is being violated for security purposes, loss of trust. In conclusion, Citations Lacewing, Michael .…

    • 1426 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    P3: Describe how software and network security can keep systems and data secure In every single large organisation, security of data and system are very important. I will describe how network security and software are able to keep the data and systems secure. I will write about alternative network security methods and software which every single company should use. I will also explain these terms to show a better understanding of how important it is ti protect data and system which an organisation is working with.…

    • 1134 Words
    • 5 Pages
    Improved Essays