Information Security Methods

Superior Essays
Information security has arguably been around for centuries. Around the fifth century BC, the time of Herodotus, information was secured by shaving the head of a slave, tattooing a message, and before the slave was given orders to deliver the message, the hair was allowed to grow back, thus concealing the message and having rudimentary information security (Patterson, 2010). This ancient method of protecting information is highlighted to articulate information security methods are in need of constant revisions to protect information from new threats. According to Taluja and Dua (2012), information security methods are in need of constant revision to combat both new and upcoming threats. These new threats arise in different forms derived from …show more content…
Furthermore, educational institutions have the highest documented rate of information being compromised (Custer, 2010; Jones, 2009). Ayyagari and Tyks (2012) wrote that over 8 million academic records were compromised from security breaches in 2005. Data breaches have continued to rise since 2005 despite implemented regulations designed to protect information (Sen & Borle, 2015). A method for mitigating and combating the unauthorized release of PII is the training and education of users in the arena of information security (Aloul, 2012). The unauthorized release of information or information leakage can be attributed to either internal or external entities that are conducted either by a human or technical methods (Trinkle et al., 2014). Shaw, Keh, Huang, & Huang (2011) noted that 50% incidents related to information security were associated to the inattentiveness of personnel handling the information. Employees in non-information security roles feel the protection or practice of securing information is the job of those in information security roles (Thomson & van Niekerk, 2012). Consequently and due to increases to information security threats (Cavelty, 2014), White et al. (2013) remarked the increased need for educating users on methods to secure information. Educating users in the various characteristics of information security awareness

Related Documents

  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    associate screening, insider employee theft, and failure to update information security methods (Matwyshyn, 2009, p. 584). A breach incident is the unauthorized access to confidential or sensitive information which can result in the compromise or probable compromise of this data. This Information which could be confidential, protected, or sensitive can include personal identity information, health information, intellectual property or professional trade secrets of an organization, and financial data of the organization, customers or individuals. As the use of technology to collect, filter, process, and distribute data becomes more increased so do breaches. Data breaches are increasing among businesses and individuals with considerable financial…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The authors of the book suggest physical means of making sure that your personal information does not get into the wrong hands. So what will it be: hammer or axe? ` In conclusion, the third chapter of Blown to Bits was very informative. “Ghosts in the Machine” was a chapter about how information can be hidden within computers. It is important to be careful when sending sensitive information.…

    • 607 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Response Essay Rewrite In recent times, Apple and the FBI have been arguing over the creation of software that would be able to reveal encrypted information. The author of the article Biting Apple Bruises Privacy Rights, argues the idea that by forcing Apple to hack their product will result in future violations of security and privacy. Personally, I strongly agree with the writer’s belief that forcing companies to reveal secured information is completely unwarranted and should not be allowed under any circumstance.…

    • 1482 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The aim of this paper is to outline the dynamics of Walters Security. Walters Security’s main objective is to ensure a high level of network and information security for reach client. Customer and client information, payment information, personal files, bank account details- all this information cannot be fully restored once it has been lost or breached by criminals. The goal of this firm is developing an interdisciplinary research platform to develop a framework and provide benefits to eliminate breach-related vulnerability of information.…

    • 762 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Opm Hack

    • 896 Words
    • 4 Pages

    With the expansion of technology and the Internet, people fiercely protect their online identity to include regularly changing and safeguarding online passwords, upgrading security scans to keeps computers protected from viruses. However, personal and sensitive information exists online, and it is vulnerable even when safety measures are in place. This vulnerability led to a compromise of the Office of Personnel Management (OPM) database and sensitive information was obtained by unauthorized sources. Living in the information age is exciting and convenient. People can sit at their computers and conduct research without ever having to consult a print-version encyclopedia, shop without ever having to leave the comforts of their…

    • 896 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    As seen with the case in which someone has to put a password to an Email account, confidentiality is a matter that is of great concern in many scenes of life . Cybersecurity is quite applicable as a tool that offers security when it comes to transfer of data though networks and between different people in one connection. For instance, cybersecurity is a tool used to ensure that the information shared among workers within an institution, through a connection of computers and computer systems, is not accessed by people who do not belong to this organization. In many cases, people will try to enter forcefully and access such confidential information without the consent of the organization. Cybersecurity helps such organizations in installing systems where access will be denied to non-members, and allowed to members since they make use of passwords and other security mechanisms installed within the computers and the connections .…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Homeland Security

    • 1157 Words
    • 5 Pages

    Security systems both physical and virtual are utilized to safeguard information from being copied, stolen, or destroyed. This is complicated by the fact that cyber-attacks can originate from hundreds of miles away and the source can be complicated to determine (Kemp 2012, p. 33). This leads to more robust security systems and multiple layers of duplicated…

    • 1157 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Thesis statement: Information privacy is considered an important aspect of information sharing. With the advancement of the digital age, personal information vulnerabilities have increased. With that in mind we should have the knowledge to ensure our safety in the internet through protective measures such as encryption, authentication, and data masking, etc. I. How the internet changed privacy. A. How the end of privacy started.…

    • 269 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Yet when combined, they paint a rather detailed portrait of our personalities and behavior, a problem I call “aggregation.” (Solove 2008, p. 70). The ease of access to student databases through internet has given rise to a new problem of identity theft. According to a federal report, there were 93 documented security breaches in 2005 to gain access to personal information like Social Security Number (SSN), date of birth, credit card information from education records, and most of these breaches occurred in colleges and universities (Thomas B. Fordham Institute,…

    • 820 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    SANS GIAC Security Essentials, CISSP: Certified Information Systems Security Professional, and CISM: Certified Information Security Manager (Tittel, 2015). He said in the article that, “When it comes to information security, you need only read the headlines to observe that those with malicious intent constantly find new and scary ways to access and misuse privileged information for criminal, unscrupulous or questionable purposes” (Tittel, 2015). This shows and proves that to make it in the information technology you can’t stay…

    • 990 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Social Security Threats

    • 1071 Words
    • 5 Pages

    Introduction As time passes, technology continue to evolve, become more advanced and easier to use and people also become more knowledgeable about technology. But this also create a huge problem such as hackers, people who do not respect the privacy of others. This was demonstrated when thousands of personal records from normal users was exposed online. This could be preventing if the system was tested carefully, which is what happened to Samsung newest smartphone when thousands of people reported the phone was busted into fire. Issue 1 Source…

    • 1071 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    The Power of Privacy ‘The Power of Privacy’, is a short documentary film about privacy issues that the modern digital world exposes individuals and businesses to, as seen through the eyes of journalist Aleks Krotoski (Budge, Cooper & Hoeff, 2016). As Aleks opens up her own digital footprint to be examination by hackers, information security specialist and data consultants, both her personally and professionally information that she willingly and unwittingly shared online, is accessed and the security is scrutinised. The central message of this documentary film was to raise awareness about the vulnerabilities that exist within the information security (Budge et al., 2016, 6:50) platforms, and the significance of controlling one’s digital footprint…

    • 899 Words
    • 4 Pages
    Improved Essays