Preview

Security Issues

Good Essays
Open Document
Open Document
567 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Issues
Security is the number one concern in the information technology world. As the 21st century evolves the technology advances with it as well. Information Security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. It revolves around maintaining three basic concepts of information—confidentiality, integrity, and availability. Other basic concepts such as: nonrepudiation, authentication and authorization relate to the people using the information across the internet. The rapid evolution of the World Wide Web has created such of convenience for everyone, while at the same time it created an easier way for your confidential information to become public.

Confidentiality means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information.1 Information confidentiality is a major concern for government, military, financial institutions, hospitals, corporations and private businesses. Data encryption is one of the most used ways to maintain data confidential followed by restricted access. Organizations must carefully chose the information they allow each employee to access in order to be able to maintain their data confidential. Any security breach that compromises any confidential data could cause severe consequences to any organization.

Integrity means guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity.1 Limited access to any information helps maintaining its integrity. The data that every employee is able to access is controlled by the network administration department. Each user is categorized to different groups, depending on the group to which the user is assigned to will determine how much or how little that user will be able to access. In some cases there are some users that do not fall under any specific

You May Also Find These Documents Helpful

  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Confidential information is personal details from our lives which we may not want to share with others. It can include our address, phone number, birth date, employment history or other personal information. It may also include information about our past or present health and development.…

    • 2926 Words
    • 12 Pages
    Good Essays
  • Good Essays

    The AIC Triad

    • 472 Words
    • 2 Pages

    Confidentiality limits how much access a person has to certain information. For example, a janitor would not have as much access to the secret information of a company as say the IT specialist of that company. The most accurate way to ensure that the data has not been compromised is to set restrictions on every person that is hired into the business and only allow people to have access to the information that will…

    • 472 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Air Wright case study

    • 1396 Words
    • 5 Pages

    Today if we are talking about computer security there are different terminologies that contribute in making the outline of computer security. It is the combination of different processes and mechanism by which important and sensitive information are secluded from publication and tampering by unauthorized persons. The major focus of computer security is to protect information and critical data from unauthorized usage. Computer security has deep roots in Information technology industry. Security in IT can be defined as a branch of computer science which is related to control of different kinds of risks associated with critical data. This can be done only if the authorized person dealing with the system network or administration secures this information with good software and servers which are designed to work heavily.…

    • 1396 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Confidentiality is what is set between an employee and their client that says that they the employee or institution will not release the information that the client tells them.…

    • 475 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information security is the way of ensuring information is only read, heard, changed, broadcast and otherwise used by people who have the authority to do so. It requires a range of skills and knowledge and increases in significance as our use of and reliance upon information grows.…

    • 112 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Confidential information is defined as any private information understood not to be shared with a 3rd party(DM 2012)…

    • 1127 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    It also entails the protection of information and information systems against unauthorized access or modification of information, whether in storage, processing, or transit, and against denial of service to authorized users. Information security includes those measures necessary to detect, document, and counter such threats.…

    • 3219 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    A Risk managment

    • 510 Words
    • 2 Pages

    Information assurance: The act of ensuring that data is not lost when critical issues arise. These issues include but are not limited to: natural disasters, computer/server malfunction, physical theft, or any other instance where data has the potential of being lost. Since most information is stored on computers in our modern era, information assurance is typically dealt with by IT security specialists. One of the most common methods of providing information…

    • 510 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Security Concerns

    • 266 Words
    • 2 Pages

    If Kudler Fine Foods decided to one day remove their security system, here are a few things that they must be aware of. If Kudler Fine Foods was without a security system that would allow easy access to their entire system. The first concern would be how easy it would be to obtain many types of malware and viruses. Many of these may just result in the system slowing down but some of the others may be much worse, like a key logger.…

    • 266 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Security Issues

    • 291 Words
    • 2 Pages

    The article talks about the most unexpected of data breaches. Mostly in cyber crime, data-thieves, target large-scale networks as a means of hijacking important information about credit card numbers of customers or other bank details. However, in this situation, the on-campus clinic database of UC Berkeley (University of California) was breached. "Coughing up tons of data about parents, students and spouses" (Fox, 2009). The unexpected nature of this security breach may be overlooked, since it is "just" a schools clinical database. However such systems contain invaluable information to identity thieves. Information like credit card numbers addresses, etc, which could undermine the safety and security of the individual. This indicates a shift from the normal conventional attacks on financial institutions to poorly secured alternative databases, where cyber criminals can retrieve information about people. The article stipulates that in such a situation, the end users are no longer the weakest link in the security chain. In this sense, most of the blame cannot be put on the end users. "The distinction belongs to the corporations above the chain" (Fox, 2009). It is necessary as end users to keep our computers and all other relevant information safe. However, if companies who are in charge of such sensitive information employ an insecure and shoddy way of doing their job, then security will always be an issue. My verdict is, companies who house information, should know that all data is relevant to a client. So, important mechanisms and policies should be put in place to secure their data.…

    • 291 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Models

    • 30929 Words
    • 124 Pages

    security levels of network devices, operating systems, hardware, protocols, and applications can cause security vulnerabilities that can affect the environment as a whole.…

    • 30929 Words
    • 124 Pages
    Powerful Essays
  • Powerful Essays

    Cis Studyguide

    • 1150 Words
    • 5 Pages

    Figure 1-1 shows that information security includes the broad areas of information security management (the topic of this book), computer and data security, and network security. At the heart of the study of information security is the concept of policy (discussed in detail in Chapter 4). Policy, awareness, training, education, and technology are vital concepts for the protection of information and for keeping information systems from danger.…

    • 1150 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    security threats

    • 629 Words
    • 5 Pages

    Table 1 - Table identifying the top threats to the new customer rewards program at Kudler Fine Foods…

    • 629 Words
    • 5 Pages
    Satisfactory Essays