When it comes to security of information there are three distinct levels involved in the protection of corporate information. In this paper, I will be examining each of these three levels of security, providing an example for each. The first and possibly the most noticeable is physical security, also known as enterprise security. The next level necessary in an organization is information security or managerial security. The third level of security is information technology, (IT), security. The insurance of information security in a business requires all three levels of individual security to regulate and control access to the information an organization considers valuable. Initially when thinking about …show more content…
Information security revolves around the three pillars; confidentiality, integrity, and availability, (CIA). Confidentiality – Customers want to know that their personal information will be safe and not used without consent. A business client wants to be sure that sensitive information provided does not end up in the wrong hands. Integrity – Information should not be altered or changed by unauthorized persons. Information should be reliable, once it is manipulated then it loses its value. Availability – personal information kept about individuals or businesses should be available when requested. Also access to pertinent information should be readily available to those in management that need it (Government of Hong Kong Special Administrative Region, …show more content…
(2016, February 8). Hack brief: Hacker leaks the info of thousands of FBI and DHS employees. Wired. Retrieved from https://www.wired.com/2016/02/hack-brief-fbi-and-dhs-are-targets-in-employee-info-hack/
The Government of Hong Kong Special Administrative Region. (2016, August). What is information security. Info Sec. Retrieved from http://www.infosec.gov.hk/english/information/what_icana.html#c
The International Consortium of Investigative Journalists. (2016, April 3). Giant leak of offshore financial records eposes global array of crime and corruption. The Panama Papers. Retrieved from https://panamapapers.icij.org/20160403-panama-papers-global-overview.html
Korolov, M. (2016, April 07). Millions of child support records stolen, D.C. officials want answers. Retrieved from http://www.csoonline.com/article/3053531/security/millions-of-child-support-records-stolen-dc-officials-want-answers.html
National Center for Educational Statistics. (n.d.). Protecting your system: Physical security. Safeguarding Your Technology, chapter 5. Retrieved from https://nces.ed.gov/pubs98/safetech/chapter5.asp
Sans Institute. (2016). IT resources. Retrieved from