Importance Of Information Security

Superior Essays
Register to read the introduction… Risk identification, risk assessment/analysis and risk control. Risk identification involves the examination and identification of the security status of the organization’s technology and the risk it faces. Risk assessment is the process of determining the extent to which the organization’s information assets are exposed or are at risk. Risk control involves putting controls in place to reduce the risk to an organisation’s data and information systems. The process of risk identification is broken down into stages. First the information security team identifies organization assets which include people, procedures, data, software, and hardware. Next the assets are classified and prioritized. Finally, threats are identified and prioritized. This final stage of threat identification is important because it helps the information security team to know and understand the possible risks out there in order to devise appropriate controls of mitigating against them. These potential threats include though not limited to the following.
1. Compromise of intellectual property: This occurs when attackers gain access to sensitive material that the organization considers integral to their day-to-day
…show more content…
Theft: This is a physical threat that comes about primarily from not ensuring proper physical security in an organization.
8. Technical hardware failures or errors: an organization is exposed when equipment is not maintained in proper working condition.
9. Technical software failures of errors: Both custom built and off shelf software are prone to attacks if measures are not put into place to defend them. Bugs, errors in codes are some of the vulnerabilities that lead to attacks whereby malicious code can be inserted into this code to carry out a specific act
10. Software attacks: these include viruses, worms, macros or denial of service. These attacks can be either internal (where a case of either a former employee makes an attack) or external where an attack is sent in from outside.
By identifying the threats that pose potential danger to the organization, the organization saves time later when formulating controls be ensuring only potential threats are considered. After identifying the potential threats, they are ranked accordingly in order to quantify the level of effort required to defend against the said threat, that is, 1-5, with 5 representing a most dangerous
…show more content…
The business continuity plan is activated when the infrastructure is totally unable to perform hence relocation of operations to an alternative location.
Information technology over time has evolved drastically to a point where companies no longer look to technological advancement as a means to be ahead of the competition but endeavor to improve their assets so that they do not get greatly affected by looming threats to a point where they cannot provide their clients with services they have got used to.
It would be extremely costly even for a very big organization to put together resources (funds and personnel) to prepare strategies for every conceivable threat. 5 major strategies have been identified to guide organizations in addressing threats with depending on the level of the danger presented by the particular

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Many of these concerns may be remedied by simply revisiting the company policies and procedures. Data loss is a serious problem. Typically large companies have an automatic data backup in place. Proper automatic backups can be set up daily, weekly, or monthly. For this size company, I would recommend daily backups.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Hacker access, activist access, an insider attack. Hacker access involves an outside entity gaining access to the network via unpatched systems, vulnerability, or by any other technical means. Activist access consists of a hacker affecting the network maliciously with a political or moral agenda in mind. Insider attack can be the most dangerous of the three. This involves someone within the organization do harm to the network using the credential or access they were granted to perform their regular duties.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    1. What are the danger to the system? There numerous dangers that can put your system at danger, for example, infections, spyware, worms, Trojans and PC programmers. Your systems are additionally helpless excessively critical who perpetrate cybercrimes. 2.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    Written Assignment – Unit 7- Ecommerce ________________________________________ Submit a written paper which is at least two pages in length, double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. After referring to Chapter 3 of Information Security for Non-Technical Managers, discuss the three main areas of accountability regarding information security. When discussing each area, provide an example from outside the textbook. Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    John Parachini Case Study

    • 790 Words
    • 4 Pages

    This paper will also relate the threat of this type of attack with the risk management perspectives…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    P1 – The impacts that different types of threats have on an organisation Technical Failure A technical failure can be caused for many different situations. Most devices will fail at some point because of some kind of error. There are certain measures that can be put into place to avoid these errors from occurring more often. Such as the training of staff of the device they are using so these issues will become less common and then they will also be to most likely solve the problem also.…

    • 1227 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    associate screening, insider employee theft, and failure to update information security methods (Matwyshyn, 2009, p. 584). A breach incident is the unauthorized access to confidential or sensitive information which can result in the compromise or probable compromise of this data. This Information which could be confidential, protected, or sensitive can include personal identity information, health information, intellectual property or professional trade secrets of an organization, and financial data of the organization, customers or individuals. As the use of technology to collect, filter, process, and distribute data becomes more increased so do breaches. Data breaches are increasing among businesses and individuals with considerable financial…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Mensa IncStrategic plans are created at all three levels of an organization that include corporate, business, and functional levels of any organization which main purpose is to describe the objectives, goals, and also other plans necessary for accomplishing these goals. Finance, Marketing, Operations, and also Personnel are also important and should be measured when incorporating a strategic plan for any business. The Mensa Company has engaged itself with various businesses, which include Energy, Packaging, Forest Products, and also Financial Services. Each individual businesses and their sub-divisions should be required to appraise performance and also modify business strategies to ensure that increasing productivity is the main goal…

    • 1266 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    Internet Security/Cyber criminal 1. Explain how Internet security measures can actually create opportunities for criminals to steal, rather than prevent them. The onslaught of security breaches on the internet make the threats to e-commerce very real for business, consumers, and government, and politician. There are individuals that hack into computers as well as the networks of businesses and government agencies.…

    • 606 Words
    • 3 Pages
    Improved Essays