Security Issues

Topics: Information security, Password, Authentication Pages: 2 (567 words) Published: May 7, 2013
Security is the number one concern in the information technology world. As the 21st century evolves the technology advances with it as well. Information Security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. It revolves around maintaining three basic concepts of information—confidentiality, integrity, and availability. Other basic concepts such as: nonrepudiation, authentication and authorization relate to the people using the information across the internet. The rapid evolution of the World Wide Web has created such of convenience for everyone, while at the same time it created an easier way for your confidential information to become public.

Confidentiality means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information.1 Information confidentiality is a major concern for government, military, financial institutions, hospitals, corporations and private businesses. Data encryption is one of the most used ways to maintain data confidential followed by restricted access. Organizations must carefully chose the information they allow each employee to access in order to be able to maintain their data confidential. Any security breach that compromises any confidential data could cause severe consequences to any organization.

Integrity means guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity.1 Limited access to any information helps maintaining its integrity. The data that every employee is able to access is controlled by the network administration department. Each user is categorized to different groups, depending on the group to which the user is assigned to will determine how much or how little that user will be able to access. In some cases there are some users that do not fall under any specific...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Cmgt 400 Week 2 Common Information Security Threats Essay
  • Essay about Data Security in Healthcare
  • Risk management
  • Privacy issues in Ecommerce1 Essay
  • Essay about System Security
  • Unit 242 It Security for Users Essay
  • Security Program Essay
  • Security Issues in Cloud Computing Essay

Become a StudyMode Member

Sign Up - It's Free