Preview

Nt1310 Unit 1 Assignment 1

Powerful Essays
Open Document
Open Document
1434 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 1 Assignment 1
Read Me First

Introduction

COURSE OVERVIEW

Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.

This course covers much material about information security in a few short weeks. Whereas the subject is much deeper than what is covered in the course material, you should obtain a useful overview of how important effective information security is, and some ways it can be effectively
…show more content…
In addition, organizations constantly face legal, ethical, and regulatory requirements from governments, business partners, and others they work with. These will add additional factors when weighing the costs and benefits of different solutions to information security risks. In fact, these requirements may even make some risks more important, often because a company will not want to get in trouble with a government even though they might normally live with the risk they are being forced to resolve through regulations. Understanding the various laws that will affect data is of prime importance to any security …show more content…
A popular saying is, “inspect what you expect,” and this is definitely true in the area of IT information security auditing. The goal should not be to catch rule breakers, but rather to work with IT and the business to ensure nothing slips through the cracks and that solid practices are always followed. Doing this will go a long way to ensuring and maintaining the expected information security policy of the

You May Also Find These Documents Helpful

  • Good Essays

    NT1310 Unit 1 Assignment 1

    • 4837 Words
    • 20 Pages

    In order to get some statistical data about the number of formula 1 crashes and their causes, we randomly picked up 1 race from each year starting from 1960 up till 2013, then extrapolated results to the respective entire year, and then calculated average numbers. Based on those figures we compiled the table below.…

    • 4837 Words
    • 20 Pages
    Good Essays
  • Satisfactory Essays

    This paper will discuss the three types of network topologies discussed in Chapter 3. They are, hierarchical star, bus, and ring network topologies. Each has its advantages and disadvantages as will be discussed…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There are many different types of network topologies. They each have their different strong points. They also have their own disadvantages. There are 3 main network topologies used today, hierarchical star, bus and ring. In the following paragraphs I will go into each of these topologies.…

    • 545 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 3 Assignment 1

    • 6320 Words
    • 26 Pages

    “A bus network topology is a network architecture in which a set of clients are connected via a shared communications line/cables” (Abu, 2013). There are several common instances of the bus architecture, including one in the motherboard of most computers. Bus networks may be the simplest way to connect multiple clients even though many may have problems. When two clients want to transmit at the same time on the same bus, this may cause some problems. Thus systems use bus networks normally some may have scheme for collision handling or collision avoidance for communication on the bus. Though this may be quite often in using Carrier Sense Multiple Access or the presence of a bus master’s who controls access to the shared bus resource.…

    • 6320 Words
    • 26 Pages
    Powerful Essays
  • Better Essays

    Data security would be a method that corporations use to keep important and confidential information protected. Access to this type of secure information is limited to those who have the authorization to view it. Data security is enforced so that private information that a corporation has about its employees, customers and others that they conduct business with is kept safe from any potential corruption from those who want to use it to their advantage. Many companies go to great lengths to keep their data safe and sound from hackers who can get confidential information from their systems. If a company is not careful and does not protect their confidential information many problems can occur. Some of these problems include identity theft of customers and employees. Hackers can steal information such as social security numbers, addresses, credit card information and many other key pieces of information that can let hackers easily access ones identity. The focus of this research paper would be about the Michaels Stores…

    • 813 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Project Deliverable 5

    • 899 Words
    • 4 Pages

    Secrecy ensures the safety of data from illegal access throughout an organization’s information planning, which extends to all data directly linked with the architecture’s applications, data stores, communication links and/or processes.…

    • 899 Words
    • 4 Pages
    Good Essays
  • Good Essays

    First of all confidentiality in respect to information systems is where information is restricted or limited to only persons authorized to use it. Confidentiality of information is especially important to businesses that thrive on sensitive customer information, example those who receive payments online and banks who store customers financial and personal information. However it is also a great concern to companies such as retailers and manufacturing companies as they may depend on this information to a certain extent (e.g. to decide on effective marketing strategies and to gain a competitive advantage). Confidentiality of a business’s information may be threatened in many ways. Persons may try to gain unauthorized access of a business’s sensitive information for personal gain e.g. identity theft and phishing. They may also attempt to steal secrets such as a business’s trade secrets and processes which give them a competitive advantage and also government agencies top secret information. Some technologies which can be used to increase the level of confidentiality are authentication methods which control the access to certain information such as password logins, single sign on, password updates and specifications.…

    • 654 Words
    • 3 Pages
    Good Essays
  • Good Essays

    One very important task in defining the needed security for a system of data is first to understand the nature of that data and how it is used in a given system. Within any given organization there is a myriad of data that can all be categorized in a different way. We can use this opportunity to discuss the sensitivity of data within our organization and then break it into appropriate classifications to be used when implementing security measures. Additionally, this process will help the organization to conform to the ISO standards the company may be subjected to, in this case, ISO/IEC code 18028. This also directly relates to certain laws that also pertain to the security of information and finally how the organization will be able to test and measure how well these security practices are implemented and followed. Lastly, we can outline here how controls can be created and implemented to enforce these requirements as well as how auditing can validate the effectiveness of these implemented controls.…

    • 1069 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    “Businesses, governments, and other organizations face a wide array of information security risks. Some threaten the confidentiality of private information, some threaten the integrity of data and operations, and still others threaten to disrupt availability of critical systems” (Sullivan, 2009). Since such security risks are always going to present in the cyber world, businesses and organizations need to fully be aware of any vulnerabilities in their systems. The initial realization of any organization’s vulnerability can only first be understood through the knowledge of what vulnerability means. A vulnerability is a security weakness but not a security threat. It is what needs to be assessed in order to examine an organization’s network. One of the main network vulnerabilities facing IT managers today is the absence of encrypted data being transferred and received between uninformed users and the lack of knowledge and understanding within an organization’s internal structure.…

    • 1764 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Consequently, protecting and safeguarding information has become a necessity which organizations cannot ignore. According to the central intelligence agency (CIA) (2000), to secure information effort must be made to ensure confidentiality, which is preventing disclosure of information to unauthorized individuals or systems. Also, the information must have integrity, maintenance and assuring the accuracy and consistency of data over its entire life cycle. This means that data cannot be modified unauthorized or undetected.…

    • 815 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount.…

    • 33887 Words
    • 216 Pages
    Powerful Essays
  • Better Essays

    Protecting Organizational assets and information has become a top priority for almost all organizations these days, the reason being the confidential data getting stolen and misused which leads to an organization’s great loss.…

    • 1226 Words
    • 4 Pages
    Better Essays
  • Good Essays

    The emerging technology of today’s generation brought up the advancement of processes in people’s lives. Information technology (I.T.) is a more specific term that stresses the role of unified communication and the integration of telecommunication and computers (Murray, 2011). Specifically, computer is a general purpose device that can be programmed to carry out a finite set of arithmetic and logical operations. It lessens the tedious tasks carried out in manual based operations in the society. However, providing efficient security is still considered as one of the arising difficulties in information technology.…

    • 409 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Many researchers have been concerned about the security of sensitive data. There are a lot of improvement and evolution of technologies in internal auditing. First of all, sensitive data is information that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.…

    • 1728 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    ISM Workshop

    • 1008 Words
    • 5 Pages

    Computer security refers to the methods and practises that are employed by employees to protect private resources in a computer system from being accessed, modified or deleted (Gollmann 2010). Many industries implement strict computer security measures. This may include installing physical locks on doors, security cameras, security guards, and emergency protocols in the occurrence of a flood or fire. Firewalls, varying levels of access privileges, and data encryption prevent the interference of data that is stored or accessed on a computer. The United States’ Computer Security Act of 1987 requires federal departments to provide training to employees to teach knowledge workers these skills, as the emergence of communications devices and technologies has made most industries vulnerable (Whitman 2010, 194). Schell discusses how a lack of computer security in US Government programs has led to the exposure of sensitive military communications and strategies (2013). This is in contrast to Information security, which encompasses computer security in addition to physical, operations, communications and network security in an information system (Whitman 2010, 4). The CNSS security model provides a framework of desirable attributes of a secure information system, which includes confidentiality, integrity and availability (Whitman 2010, 4).…

    • 1008 Words
    • 5 Pages
    Better Essays