P2 Explain The Principles Of Information Security Essay

Improved Essays
7/A. P2: Explain the principles of information security when protecting the IT systems of organizations
7/A. P3: Explain why organization must adhere to legal requirements when considering IT system Security.
7/AB. D1: Evaluate the effectiveness of the technique used to protect organisations from security threats whilst taking account of the principles of information security and legal requirements.

Principles of information security
Information security is an extremely important concept so when protecting information in an organisation there is three core principles to follow to maintain the utilization, flow and storage of data this is also known as the CIA triad these are the three main objectives of information security and they are:
…show more content…
Proper password security
Passwords are is a convenient method of authentication the way it works is the system requires someone to enter a piece of information and then match it to the one that the system has if the information is correct the user will be able to access the system but there is some disadvantages of this some people may try to gain your password by looking over your shoulder or a brute force attack which implies that the person trying to require your password will try to maybe use a program that will automatically enter numbers and letters to try match it so some companies will have a method to prevent this for example they give you a certain number of tries to enter the password so this means that the person who entering the password will get a certain amount of tries this will prevent programs from searching for your password there is also the fact that you might have to type in more than one piece of information to gain access so this could be a password plus a security question that only you would

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    After researching the national and international standards, create three policy statements that apply to the entire organization, comply with a national or international standard, and might have prevented the security breaches identified in part A.…

    • 588 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The basic protection of data depends on update the anti-malware protection, firewall, and encryption. Creating some security awareness programs. All the people should maintain the data confidentiality and data integrity. In each organization…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room. We are going to talk about three main areas of accountability concerning Information Security.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    7/A. P1: Explain the different security threats that can affect the IT systems of originations.…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Cyber Security Threats

    • 983 Words
    • 4 Pages

    For many employees in an organization, security processes may be a new domain, they may struggle with understanding and therefore employing. Security teams have to explain in easy to understand, layman terms the need for such security measures to create awareness and strengthen them.…

    • 983 Words
    • 4 Pages
    Improved Essays
  • Brilliant Essays

    (2006, February). Special Publication 800-18 REV 1: Guide For Developing Security Plans For Information Technology Systems. Retrieved October 30, 2015 from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf…

    • 1450 Words
    • 6 Pages
    Brilliant Essays
  • Improved Essays

    The reason for the article is to stress the importance of information security to any organization. The problem presently is that many organizations either do not have enough security or they have a lack of interest in the security measures as it pertains to their individual organization. The solution to this is that organizations must ensure they have a proper balance and remain vigilant at all times. This means remaining flexible as well as adaptable to the situation of the day. This document will examine how and what role the US government surveillance has played in the information security of tomorrow. Additionally, this report will address what individual organizations can do in this ever changing environment. Lastly,…

    • 967 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The aim of this paper is to outline the dynamics of Walters Security. Walters Security’s main objective is to ensure a high level of network and information security for reach client. Customer and client information, payment information, personal files, bank account details- all this information cannot be fully restored once it has been lost or breached by criminals. The goal of this firm is developing an interdisciplinary research platform to develop a framework and provide benefits to eliminate breach-related vulnerability of information. To adequately protect this information, each member of Walters Security will be required to adopt appropriate steps to manage the security of all private information. This paper will further discuss current…

    • 762 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity Policy Paper

    • 1062 Words
    • 5 Pages

    In today’s technological society it is very important that organizations maintain strong security policy documentation. The most important documentation that should be maintained is the cybersecurity policy. In this paper I will discuss the cybersecurity policy of the organization I have chosen (Apple INC). This paper will supply an analysis of the strategy that they use to protected themselves against fraud, hackers and theft. I will also describe they use policy as a project within their program and what would happen if they had no cybersecurity policy in place. Finally, I will cover what their basic needs would be if they had no cybersecurity policy in place and they would need to prove some sort of base for their security needs.…

    • 1062 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Acceptable Use Policy

    • 1212 Words
    • 5 Pages

    Any and all information that is on the system which may be sensitive in nature, must be encrypted and stored securely so there is no unauthorized access to the information. The accomplishment of this should be done in a way that does not prevent authorized users from being able to access the information. (Example Acceptable Use Policy for IT Systems,…

    • 1212 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    Privacy Ethical Issues

    • 934 Words
    • 4 Pages

    In this paper the author will be discussing Ethical issues in Information Systems. The issue that will be reviewed in Privacy and this author will express an opinion on privacy. Next this paper will identify two to three (2-3) human and technological protective measures that would be used as security safeguards and enforcement actions. Identify at least three (3) problems related to management information systems that may arise.…

    • 934 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Protecting the company’s intellectual property and act responsibly with the sensitive information of vendors, customers, contractors, and other business partners.…

    • 818 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    An organization’s security posture is only as good as the personnel that work for the company. As such, the organization must define policies that ensure the safety, and security of its personnel. The policy should include physical security, as well as processes that ensure that personal data is protected. The company should only collect personal information when required, and disclose how the personal information is going to be used. Personnel security should be a top-down approach, with all levels of management in agreement on how best to administer the policy, and enforce it.…

    • 995 Words
    • 4 Pages
    Great Essays