The Importance Of Information Security Standards

Decent Essays
As we have learned this week in chapter 3 of Information Security for Non-Technical Managers, information security standards is defined as consisting of three elements: "The preservation of confidentiality: ensuring that information can only be accessed by those authorized to do so", "Maintaining integrity: safeguarding the accuracy and completeness of information and that no unauthorized changes are made" and "Ensuring availability: ensuring that authorized parties can access information when required." (Gelbstein, 2013) These comprise the three main areas of accountability regarding information security. Accountability is a vital information security concept. The word means that every person that works with an information system should have certain responsibilities for information assurance. The duties for which a person is responsible …show more content…
When we speak about confidentiality of information, we speak about protecting the information from exposure to unauthorized groups. Information is extremely valuable, especially nowadays. For example, personal information, like bank account statements and credit card numbers or even government documents or some trade secrets people would definitely like to keep secret. Protecting information as such is a crucial part of information security.

A key element in protecting information confidentiality has to be encryption. Encryption guarantees that only the right individuals, who have the key, can access the information. Encryption is extremely widespread in today’s world and takes part in most of the major protocols in use. A noteworthy example would be SSL-TLS, a security protocol for communications on the internet that is being used together with a huge number of internet protocols to guarantee security.

Other ways to guarantee information confidentiality consist of: enforcing file permissions and implementing access control lists to restrict admission to sensitive

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    1.02.01 Warning Banner

    • 567 Words
    • 3 Pages

    Sub section 9.1.02.01 – Warning Banners Current Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers,desktops, VPN connections, network devices). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government regulations and UnitedHealth Group directives. Modify Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers, desktops, VPN connections, network devices, application elevations). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Criteria should be developed on who has access to what information, and appropriate technical safeguards should be put into place, so information is only…

    • 614 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    Data Confidentiality: When you keep important data it is important that the data doesn’t go out to the wrong hands. So if a business data is suddenly leaked online or maybe stolen, then this can result in a huge loss for the business and this can potentially put the business out of business. To overcome this problem, then you would need a good security program which can safeguard against any breach in confidentiality. Data Integrity: This is used to ensure that the most important data is secure and also makes sure that the data isn’t messed around with. If any of the data has been messed around with then this can result in major problems.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    4. CORRESPONDING DUTIES: As a user of the company network you have the following obligations: 1) To answer for your personal account granted to you by CRI company. 2) To keep confidentiality of company’s information, maintaining its integrity and keeping information from being accessed by non-authorized users.…

    • 1019 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Cost Benefit Analysis

    • 1774 Words
    • 7 Pages

    Choosing the appropriate EMR (electronic medical record) vendor is essential to a successful transition from paper records to electronic medical records. Many factors must be weighed in this selection process. One method to help hospitals and practices make this complex decision is to complete a cost-benefit analysis. Entire books have been written on how to conduct cost-benefit analysis and an in-depth analysis goes well beyond the scope of this paper. Instead, this discussion will focus on how cost-benefit analysis can help to determine an appropriate EMR vendor.…

    • 1774 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Assignment Task Sheet

    • 2082 Words
    • 9 Pages

    1. Ensure you have completed all of your induction paperwork and file your display order in the following order: • WHS Observation sheet (all practical tasks and worksheets in the same plastic sleeve placed behind the Observation task sheet) • Written response task sheet (assessment to be placed behind this task sheet) • Safety sense certificate • Work experience forms to be placed in the LAST plastic pocket in the folder. 2. Computer folders – establish new folders in your drive or desktop as set out below: Certificate 2 Business - 2015 folder (Year 12 students only) - BSBPROJ1 – WHS o Safety Sense Certificate o All other documents - BSBPROJ2 – Student Advisory Service o Task Sheets o Portfolio documents o other - BSBPROJ3 – Customer Service…

    • 2082 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    In 1996, United States Congress passed the Health Insurance Portability and Accountability Act (HIPAA) as a way for Americans to continue with health care insurance during a job transition and reduce health care fraud and abuse (California Department of Health Care Services, 2015). Providing health care services at the administrative level, the organization is responsible for protecting the individuals served private information when working with other health care providers and those supporting the individual needs. In this analysis the origins and impact of HIPAA/Private Health Information (PHI) while serving individuals with Intellectual Developmental Disabilities will be discussed, along with Bardach’s eightfold process of HIPPA/PHI and…

    • 1101 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    I am volunteer in Milan centre . I am going for work experience . I am going every Wednesday with my friends .There is disabled people .There is young and old people .And they do art and playing games .we don't need to do anything . We just help them.…

    • 1182 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Why Collect HR Data

    • 1110 Words
    • 5 Pages

    Personal data should be protected, this can be achieved by adding locks to filing cabinets and password protecting electronic information. Personal data should not be transferred to a country outside the EEA, exceptions may include legal requirements, or employee has given permission. Freedom of Information Act. Is the UK government legislation that allows for the release to the public, information held by public authorities.…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    For the past seven weeks, I practiced evidence-based practice when I provided care to my patients, thus it helped me to deliver care that was supported by best practice. In addition, as a future nurse whenever I practice nursing skills, I should always look for use updated evidence-based guidelines to provide care to my patients. During my clinical weeks, I was able to provide safe, compassionate and competent care for my patients. Moreover, I maintained privacy and confidently of my patients all the time. For instance, while I was providing care to my patient, one of an immediate family member asked me a general question about patient’s medical condition, and I briefly explained to the patient family member that I am not allowed to share patient’s medication condition; however, I told the family member to ask the nurse, so she can help him.…

    • 219 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    1. The message I would have received as a hospital administrator from this video would have been: The importance of keeping my organization's information secure from anyone else not permitted to have my knowledge, and more specifically the knowledge of my patient's care as well as their demographic information. It is my responsibility as a hospital administrator to keep my data secure, and whether that means hiring a IT security company or maintaining a high security software is my responsibility in order to stay within HIPPA guidelines. 2.…

    • 477 Words
    • 2 Pages
    Improved Essays