information systems risk and security

Topics: Computer security, Authentication, Authorization Pages: 4 (915 words) Published: November 7, 2013
INFORMATION SECURITY

1.A) Integrity -This is were authorized users can access, delete and modify Information and they also preserve the consistency of the information.

Privacy -This is the protection of restricted information and identity of a client.

Implementing a security model by using the principles of privacy and integrity helps preserve the information assets of an organization. With integrity this helps to maintain the consistency of the information assets from being altered by unauthorized users. Privacy is where the personal information and identity of a client is handled securely. By personal information I mean by address, name, bank account number, and password and so on. Organizations are strongly required to take such precautions to safeguard the clients personal information they collect, process and store. This is to avoid fraud and identity theft. This also helps in preserving the organizations image to the public.

B)Defense in depth is whereby more than one layer of security is applied throughout a System. This model helps the organization to prevent security breaches and gives them an amount of time to detect where and when an attack has occurred. If an organization does not have this model to protect their assets their integrity could be destroyed, their systems could get attacked by viruses and cyber terrorism.

C)Mission objective:with the use of information security it will be effective and
Achieve maximum security to protect the computer systems
Assets of the organization.

Vision objective:the policy standards should be raised so as enforce strong
Security so as to protect the clients and make sure their
Services are very efficient and that they are getting the right
Services. Also make sure the staff understand the policies and
Improve their skills and maximise their abilities.

D)High level security approach does increase complexity. These are the factors that...


References: Algosec Inc., (2012), Examining the dangers of complexity in network security environments, Algosec Survey Insights, Rosewell GA, USA.
http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&cad=rja&ved=0CDMQFjAC&url=http%3A%2F%2Fwww.algosec.com%2Fresources%2Ffiles%2FSpecials%2FSurvey%2520files%2F12_10_11_security_complexity.pdf&ei=MT1FUpfcDYGyrgf67oDIAw&usg=AFQjCNFJnvtM_Tkybfe2sUMTAZfPTufYzA&bvm=bv.53217764,d.bmk
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Information Systems Security Fundamentals Essay
  • Essay on Information System Risks
  • information security system Essay
  • Information Systems Security Survey Essay
  • Information Security Risk Management Essay
  • Fundamentals of Information System Security Essay
  • Importance of Information Security Systems: Essay
  • Information Systems Security and Control Essay

Become a StudyMode Member

Sign Up - It's Free