TABLE OF CONTENTS
I. Definition/History of Technology-Mediate Learning Environment 3 - 4
II. Background of Photonics, Inc 4
III. Current Business Issues 4 - 6
IV. Proposed Solution 6 - 9
V. Recommendations for the Executive Committee 9 - 11
VI. References 12
VII. Strengths 13
I. Definition/History of Information Security
Definition: Safe-guarding an organization's data from unauthorized access or modification to ensure its availability, confidentiality, and integrity. Protection of data against unauthorized access. Programs and data can be secured by issuing passwords and digital certificates to authorized users. However, passwords only validate that a correct number has been entered, not that it is the actual person. Digital certificates and biometric techniques (fingerprints, eyes, voice, etc.) provide a more secure method. After a user has been authenticated, sensitive data can be encrypted to prevent eavesdropping. Information security is the process of keeping the entire data safe and secure from the reach of some unauthorized people or users. It must be ensured that the data and the information is not at all visible and disclosed to anyone. On the other hand it is can also be defined as a way of safeguarding the information along with the information system which is concerned with the input, process, output and feedback from the environment. Integrity is one of the most important things that need to be taken into account when each and every system s being implemented. The information systems must be such that are reliable for people and hence can be easily utilized by the workers.
The information that is to be fed on the system must be readable, memorized, audible, and printable and hence must be of electronic nature. The information must be protected in such a way that is it not accessible to anyone and at the same time there is some sort of confidentiality among... [continues]
Cite This Essay
(2012, 03). Corporate Application Information Security. StudyMode.com. Retrieved 03, 2012, from http://www.studymode.com/essays/Corporate-Application-Information-Security-950563.html
"Corporate Application Information Security" StudyMode.com. 03 2012. 03 2012 <http://www.studymode.com/essays/Corporate-Application-Information-Security-950563.html>.
"Corporate Application Information Security." StudyMode.com. 03, 2012. Accessed 03, 2012. http://www.studymode.com/essays/Corporate-Application-Information-Security-950563.html.