P2 Explain The Principles Of Information Security Essay

Improved Essays
7/A. P2: Explain the principles of information security when protecting the IT systems of organizations
7/A. P3: Explain why organization must adhere to legal requirements when considering IT system Security.
7/AB. D1: Evaluate the effectiveness of the technique used to protect organisations from security threats whilst taking account of the principles of information security and legal requirements.

Principles of information security
Information security is an extremely important concept so when protecting information in an organisation there is three core principles to follow to maintain the utilization, flow and storage of data this is also known as the CIA triad these are the three main objectives of information security and they are:
…show more content…
Proper password security
Passwords are is a convenient method of authentication the way it works is the system requires someone to enter a piece of information and then match it to the one that the system has if the information is correct the user will be able to access the system but there is some disadvantages of this some people may try to gain your password by looking over your shoulder or a brute force attack which implies that the person trying to require your password will try to maybe use a program that will automatically enter numbers and letters to try match it so some companies will have a method to prevent this for example they give you a certain number of tries to enter the password so this means that the person who entering the password will get a certain amount of tries this will prevent programs from searching for your password there is also the fact that you might have to type in more than one piece of information to gain access so this could be a password plus a security question that only you would

Related Documents

  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Western Governors University A. Security Faults Describe three of the security faults in this scenario that caused a security breach. 1. Some accounts existed before the electronic health record(EHR) was deployed. Important steps were missed during the import of old accounts. I suggest using a clean base line for the brand new EHR system.…

    • 588 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Task 2 (P2) Describe the following physical security measures and explain how they may be used to help keep systems secure. • Locks Locks are physical security measure that can be used in different aspect within the company. The locks can be put on the door to avoid people who not supposed be in the building or employees who not supposed be on that room. There are different types of locks that can be used within the company such as Password locks that be put on the doors, this will avoid anyone coming to room without password identification to enter the room. Also the company can use ID IDENIFACTION on the door so any employees comes have to use their ID in order to enter the building, this will…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Great Essays

    Bsb301 Task 1 Essay

    • 1299 Words
    • 6 Pages

    Assessment Task 1 CASE STUDIES Learning outcomes measured: Describe the diverse groups of microorganisms associated with the human body, the impact of specific microorganisms on human health, and the body's responses to microbial pathogens Research and interpret the signs and symptoms of disease, the transmission of infectious diseases, and the appropriate infection control procedures to employ for a specific microbial pathogen Length: Short answer responses up to 300 words per question Estimated time to complete task: 1-2 hours per case study Weighting: 35 % Individual/Group: Individual Authentic Assessment: 0Yes 1 No Formative/Summative: Summative…

    • 1299 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    We are going to talk about three main areas of accountability concerning Information Security.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    A1: Business Objective: Healthy Body Wellness Center (HBWC) Office of Grants Giveaway (OGG) business objective is to offer a proficient methodology that promotes improvement in the quality and usefulness of medical grants. HBWC disburses several medical grants through federally supported health research, and implemented the Small Hospital Grant Tracking System (SHGTS) to automate assignment and tracking of the grant disbursement, streamline review of completed evaluation submitted by grant seekers and promote sharing of health information among healthcare professionals. A2: Security Principle The guiding security principle that HBWC should use to meet Federal Information Processing Standards (FIPS) is an ISO 27002 security framework, accompanied…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Brilliant Essays

    Risk Assessment: Pinellas County Schools Evelyn Davis November 22, 2015 University of Maryland University College EXECUTIVE SUMMARY Pinellas County Schools is the seventh-largest in the state of Florida. The creation of Pinellas County Schools came to be after a split in 1912 from Hillsborough County. Pinellas County serves 150 schools including magnets schools, career academies, adult education centers and a virtual school program. Pinellas County Schools with the help of 7000 plus educators offers families a wealth of educational possibilities well-matched to students’ interests, talents, and abilities. Pinellas County Schools collect and maintain data on students, faculty and staff who work within the school district.…

    • 1450 Words
    • 6 Pages
    Brilliant Essays
  • Improved Essays

    In general, intellectual property ethics involves fair treatment, moral obligation to reveal the originator, and the compensation of the work. Company employee’s intellectual property ethics includes the following (Global Ethics Solution): • Protecting the company’s intellectual property and act responsibly with the sensitive information of vendors, customers, contractors, and other business partners. • Using confidential information only for the purpose for which it was intended. • Sharing confidential information only with employees who need it to do their job. • Clearly identifying all email communications with confidential markings.…

    • 818 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Patriot Act Essay

    • 769 Words
    • 4 Pages

    Immediately after the September 11, 2001 attacks, President George Bush was able to push one of the most controversial acts through Congress. This act is called the U.S.A. P.A.T.R.I.O.T Act; which stands for “Uniting and Strengthening American by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.” This act focused on giving “...federal officials greater authority to track and intercept communications, both for law enforcement and foreign intelligence-gathering purposes...” (Oliver, 2007, p. 68). Of course, a major concern then (and to this day) is that it impedes on civil liberties.…

    • 769 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Privacy Ethical Issues

    • 934 Words
    • 4 Pages

    Introduction In this paper the author will be discussing Ethical issues in Information Systems. The issue that will be reviewed in Privacy and this author will express an opinion on privacy. Next this paper will identify two to three (2-3) human and technological protective measures that would be used as security safeguards and enforcement actions. Identify at least three (3) problems related to management information systems that may arise.…

    • 934 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    While typing your password you should look out for people looking over your shoulders because they might steal your password therefore you should cover your keyboard while typing your password. In case there is any identity fraud done the person in which their identity was stolen they’re responsible for the crimes committed by the thief while using their personal information. Some of the problems that might be faced by someone who had their identity stolen…

    • 359 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Case Study: New College, University of Oxford New College simplifies wireless access while increasing visibility and security New College was looking for a new security automation and orchestration solution. The IT office at New College realized that although their homegrown authentication and registration solution had succeeded for many years, new security measures were needed because of student-driven demand for campus-wide wireless and wired connectivity. Among other capabilities, New College needed a solution that would enable them to: • Dynamically manage switched ports that let students use the same password for wired as well as wireless access. • Configure VLANs more productively and assign membership based on level of membership access. • Reduce the incidence of virus-related…

    • 1638 Words
    • 7 Pages
    Great Essays
  • Great Essays

    Introduction An organization’s security posture is only as good as the personnel that work for the company. As such, the organization must define policies that ensure the safety, and security of its personnel. The policy should include physical security, as well as processes that ensure that personal data is protected. The company should only collect personal information when required, and disclose how the personal information is going to be used. Personnel security should be a top-down approach, with all levels of management in agreement on how best to administer the policy, and enforce it.…

    • 995 Words
    • 4 Pages
    Great Essays