Information Influence Of Information Security In The Workplace

Improved Essays
Information security is defined as protection of confidentiality, integrity as well as information access (Chen, Ramamurthy & Wen, 2012)). There is evidence which suggests that, regardless of technical controls numbers in place, institutions of higher learning such as Central Michigan University will still have to deal with security breaches. Information security does not only refer to technical problems, but is also known as ‘people’ problem. This is because most breaches occur when the people in an organization do not comply with information security policies pertaining to that particular organization. Information security compliance may be defined as information security standards as well as policies implementation for protection of information …show more content…
It is very much related to organizational culture. Organizational culture is a system of beliefs, attitudes and perceptions which characterize the relationships in a workplace. Influence of Information Security Awareness on ISPs Compliance Contents of the Information Security Policy (ISP) are updated every often, probably on a yearly basis. The policy often comprises a number of areas of environment that require controlling. New policies are created, existent ones are upgraded and also new employees are recruited, all these changes require that fresh information be disseminated. In other words, they need to inform. Some scholars perceive Information Security Awareness (ISA) as the general knowledge of employees about information security as well as their cognizance of Information Security Policy of their organizations. This is seen as overall knowledge of the employees and comprehension of potential concerns relating to information security as well as their ramifications. The employees should also know and understand requirements prescribed in the ISP of an organization such as Central Michigan University as well as aims of such requirements. There are significant relationship which is positive between information security awareness and attitude to

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Given the University’s many diverse systems and disparate departmental roles managing the various systems the overall information security plan was not update to date nor consistent. There were obvious holes in the security plan which allowed a hacker to infiltrate the main domain server. The hacker secured administration rights on the server and they managed to infect other systems attached to the network. Thankfully, a trail of clues were found by the administrators.…

    • 671 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    This author himself is a highly educated, college professor. Even with that perspective of being a scholar in this field of study for more than 5 years, Herb does not frame this article to be viewed by other highly educated university professors in his similar field of study. As I mentioned before he aims this article at a more general population. The actual audience of this piece would be subscribers to the Washington Post where this article was published. In addition to the subscribers, the ideal audience would include individuals in care about the Equifax hack or cyber space policy and security.…

    • 1616 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Developing data analytics to monitor and screen cybersecurity threats and react to threat attacker episodes and review log activities (Bergquist, 2016). Technical recommendations to boost security without significantly increasing personnel management can be achieved by incorporating security frameworks reviews, examining any area(s) of weakness or vulnerabilities and implementing security controls. Business partners of ABC Healthcare such as banks, vendors, and collection agencies will continue to thrive with the integration of proper security measures without introducing significant overhead and complexity. Integrating data sharing polices can protect the information and ultimately reduce the level of access to individuals information. To tackle information security infringements, ABC healthcare business partners must concentration on the collaboration of security control with ABC Healthcare to enforce security regulations such as data encryption, data sharing and disposal policies, and educate personnel by…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Robert Hanssen Failure

    • 1219 Words
    • 5 Pages

    Creating and designing policies and procedures geared towards being able to document and look back on security violations that have been reported is going to be a crucial step in this process (Office of the Inspector General Oversight and Review Division, 2007). Until filing this report, there was not a concrete way of doing it. Some tools that are in use today started from this report. An example of such tools is a financial disclosure program where annually FBI employees must disclose their finance records for review. This will give the FBI the opportunity to look for any discrepancies or sudden influxes of…

    • 1219 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The aim of this paper is to outline the dynamics of Walters Security. Walters Security’s main objective is to ensure a high level of network and information security for reach client. Customer and client information, payment information, personal files, bank account details- all this information cannot be fully restored once it has been lost or breached by criminals. The goal of this firm is developing an interdisciplinary research platform to develop a framework and provide benefits to eliminate breach-related vulnerability of information.…

    • 762 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    These safeguards include access control, audit controls, integrity controls, and transmission security (HSS.org). Access control requires a covered entity to implement policies and procedures to restrict a certain level of individuals from obtaining technical access to the electronic information. Audit controls must be implemented including but limited to hardware, software, and procedures to examine the access of electronic information and ensure the information is…

    • 1427 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Medical Clinic Case Study

    • 736 Words
    • 3 Pages

    These security awareness consists of some safety measures which should be followed by all the employees strictly. With these measures employees can gain a knowledge of policies which are new to them. As every year a new policy is established by an organization. So, the organization should provide an higher level employees to teach the policies for other employees in effective way. Higher representative should view all training classes are going in a good manner or not where it will show impact on the employees.…

    • 736 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Metro High School System

    • 998 Words
    • 4 Pages

    Minor breaches of this policy or those that appear to be accidental in nature will be handled informally by email or by counseling discussions. More serious breaches are handled via formal procedures. In some situations, suspension of account privileges may be warranted to prevent continued misuse while the situation is under investigation. Breaches by students may result in the temporary or permanently disabled account access or a loss of privileges, notification of a student's activities to the parents and/or suspension dependent upon the severity of the misuse. Misuse of services, resources or computer systems by a faculty or staff member(s) will be referred to the information security officer for administrative actions.…

    • 998 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Even though business executives do their best to put everything together to align the framework with the business objectives, it doesn’t work all the time. Individual working in an organization have different perspective with a different cultural background. It’s a CIO’s nightmare and they spend so much time trying to figure out the alignment between business and IT. The organization will suffer a critical challenge which affects the overall success of the firm. It will be hard for the organization to move forward and achieve any targeted goal.…

    • 723 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays