Intorduction to It Security

Topics: Information security, Security, Computer security Pages: 4 (1179 words) Published: October 18, 2008
TUI University
Maurice Bringier
Introduction to IT Security (ITM 431)
Module #1 Case Assignment
Dr. Cynthia Phillips

The Oxford American Dictionary of Current English defines admonition as “to reprove. Urge. Give earnest advice to. Warn”. Understanding this how do we employ admonitions systems to information technology to make it more useful in-regards to Network and system security? Using admonition software we are attempting to create an environment that will either prevent data from being in-advertently distributed across networks. Act as a deterrent to those trying to access the network illegally. Or warning users of the potential harm their actions may cause. In developing an IT security strategy, potential risks will need to be anticipated along with policies and procedures for the effective mitigation of these risks. There needs to be governing documentation that entails network design as well as security measures to safeguard the network from intrusion. Effective administrative procedures that ensure personnel are properly trained and continually advised of updates and/or changes to security.

In today’s world the collection, processing, and sharing of information has reached all time highs. It is because of this that the Internet as well as “IT Networks” occasionally referred to as “Intranets” need securing to protect from potentially harmful entities. The Handbook of Information Security Management tells us that there are a number of ways to identify, analyze, and assess risk. In developing a plan to secure a network there are many areas to focus on. One of them is risk, and the potential for risks should be addressed and plans and procedures developed to mitigate such risks. Risks can come in the form of external and internal threats.

Whether of a physical, logical, or social nature , a plan that will outline the company’s approach to risks that will affect security will need to be...

References: October 16, 2006
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • It Security Essay
  • Essay about security
  • Security Essay
  • It Security Essay
  • Essay about Security
  • Internet Security Essay
  • Security Proposal Essay
  • It Security Essay

Become a StudyMode Member

Sign Up - It's Free