Premium Essay

Importance Of Information Security

Submitted By
Words 948
Pages 4
The Three Main Areas of Accountability Regarding Information Security
A company cannot be an open book in its inner workings and finer details if it means to protect itself from negative consequences such as theft or being overtaken by the competition. Companies have a duty to prevent unauthorized access, copying, or destruction of their digital and non-digital data. This endeavor is collectively referred to as information security. The management of information security depends on three areas of accountability: I.T Security, Information security, enterprise (physical) security (Gelbstein, 2013). Each of these 3 will be discussed with specific examples below.
IT Security
As per Wikipedia, IT security (computer security) is “ the protection …show more content…
(Gelbstein, 2013). Access areas and a physical team of security need to monitor and have guidelines for visitors to the office. Visitors need protocol like confirmation of appointment and badges for entry. Employees who resign must hand over their username password keys, entry card etc. to make sure they cannot enter under the guise of still working there. There are always new risks to contend with. According to (Siluk, 2016), currently OpenSSH securities utilities suite is letting hackers launch massive distributed denial of service (DDoS) attacks using Internet of Things devices. This means unauthorized access the Web administration consoles of IoT devices to compromise data or (take over completely) on those devices. CCTV, Modems, and routers are at risk. What is advised in this case is that, “users of such devices try to protect themselves by always changing the factory default credentials for any Internet-connected devices they own” (Siluk, 2016). So, it is important to know the 3 areas of accountability and their components, explained above, if one is to manage information security threats. Internal and external threats to a company’s sensitive information have to be addressed and monitored just as carefully as one approaches financial and operational issues because if information gets into the wrong hands, every aspect of the business will be affected in a negative …show more content…
Gelbstein, E. (2013). Information security for non-technical managers. Retrieved on October 18, 2016 from http://my.uopeople.edu/pluginfile.php/120503/mod_page/content/23/InformationSecurityForNonTechnicalManagers.pdf
2.Computer Security (n.d.). In Wikipedia. Retrieved on October 18, 2016 from https://en.wikipedia.org/wiki/Computer_security
3. Rouse, M. (n.d.). Definition. Information Security (infosec). Retrieved on October 18, 2016 from http://searchsecurity.techtarget.com/definition/information-security-infosec
4. KasperskyLab (n.d.). System Vulnerability and Exploits. Retrieved on October 18, 2016 from https://usa.kaspersky.com/internet-security-center/threats/malware-system-vulnerability
5. WhatIs.com (n.d.). Confidentiality, integrity, and availability (CIA triad). Retrieved on October 18, 2016 from http://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA
6. Siluk, S. (2016, October 12). Vulnerability Enables IoT Devices To Be Used for Massive Cyberattacks. Retrieved on October 18, 2016 from

Similar Documents

Premium Essay

Computer Networking

...and develop a new breed of highly competitive, innovative, resourceful and values-oriented graduate through quality instruction, relevant research, community based extension and sustainable production. Department Goal: The Information Technology shall provide its students with the necessary knowledge, values and skills through research – basedendeavor in order to prepare them to meet the demands and challenges of the time. Program: BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Program Objectives: The BS Information technology program includes the study of the utilization of both hardware and software technologies involving planning, installing, customizing, operating, managing and administering, and maintaining information technology infrastructure that provides computing solutions to address the needs of an organization. The program prepares graduates to address various users’ needs involving the selection, development, application, integration and management of computing technologies within an organization Course Title: Free Elective II (Information Assurance and Security) Course Description: This course provides a broad view of information assurance and security and its major subjects: protection of information assets; access to information system; hacking legislation and industrial standards. In addition this course will serve as a guideline for students to make their course selections. Course/Year and Section: BSIT...

Words: 1777 - Pages: 8

Premium Essay

Kayworth and Whitten 2010 Misqe

...Effective Information Security Requires a Balance of Social and Technology Factors EffEctivE information SEcurity rEquirES MIS Uarterly a BalancE of Social and tEchnology xecutive factorS1,2 Q E Tim Kayworth Baylor University (U.S.) Dwayne Whitten Texas A&M University (U.S.) Executive Summary 2 Industry experts have called for organizations to be more strategic in their approach to information security, yet it has not been clear what such an approach looks like in practice or how firms actually achieve this. To address this issue, we interviewed 21 information security executives from 11 organizations. Our results suggest that a strategically focused information security strategy encompasses not only IT products and solutions but also organizational integration and social alignment mechanisms. Together, these form a framework for a socio-technical approach to information security that achieves three objectives: balancing the need to secure information assets against the need to enable the business, maintaining compliance, and ensuring cultural fit. The article describes these objectives and the security alignment mechanisms needed to achieve them and concludes with guidelines that can be applied to ensure effective information security management in different organizational settings. INFORMATION SECURITY HAS BECOME A STRATEGIC ISSUE Information security continues to be a major concern among corporate executives. The threat of terrorism,...

Words: 7959 - Pages: 32

Premium Essay

Intro to It Security

...IMPORTANCE OF INFORMATION TECHNOLOGY SECURITY Importance of IT Security Table of Contents Introduction .................................................................................................................................................. 2 e-commerce Trends ...................................................................................................................................... 2 Risks .............................................................................................................................................................. 4 Cost of Cybercrime........................................................................................................................................ 6 Prevention Steps ........................................................................................................................................... 7 Conclusion ................................................................................................................................................... 10 References .................................................................................................................................................. 11 1 Importance of IT Security Introduction For the business professional information technology (IT) security is of upmost importance. The reliance that companies have on information systems in conducting everyday business transactions has facilitated the need...

Words: 1863 - Pages: 8

Premium Essay

Cmgt-400 Security Policy Importance

...Maintaining Information Security CMGT-400 Assurance and Security 5-25-2013 Maintaining Information Security Maintaining the security of information couldn’t have been said any clearer than by Lindsey Walker of InfoSec Island, when in 2010 she wrote an article about sensitive information becoming breached. She said “Preventing information security breaches needs to become a main priority for any company when handling both customer and company information”. Sharing information has become much easier than in previous years, from the widespread mainstream use of USB thumb drives or the constant urge to share some secret news or research on Twitter and other social media. The need for a company to constantly review and update their information security policy periodically has never been greater than now. Security Policy An Information security policy should be written in a way that defines how digital information should be protected and accessed by all company employees. Most information that is used to define the Information Security Policy can be gathered by first running a risk analysis report. These reports look at your business model and create a data structure that can be used to inform a company about where their greatest risks are within the company and around the entire work place. Certain “must-have” check boxes for items that should be included in an information security policy are Acceptable Use Policy, Wireless Policy, Email Policy, and Encryption Policy. These...

Words: 1928 - Pages: 8

Premium Essay

Boss

...Bus. 101 1/2/13 Cyber Security Cyber security is defined as actions taken to safeguard information technology or computer systems against unapproved access or attack. Cyber security has become really important for businesses and modern society today. We are living in a world where information technology and other types of communication systems have a great impact on us because they infiltrate every aspect of our lives. This builds a protection of our intangible assets and actions within cyberspace which are of great importance, whether for sustaining a prosperous business, individual life and society. We are becoming more and more dependent upon information technology and the dangers we face are organized and growing. There are numerous threats that involve the cyber world. Among these are the hackers infiltrating into people’s systems and damaging files, viruses that are eliminating the system, individuals using others devices to harm others, someone pocketing your valuable credit card information to make their own purchase. Attacks from hackers and terrorist have prompted the focus on cyber security. Whenever we mention cyber security, we are focused on the prevention, revealing and reaction to attacks and threats having to do with information in your computers. As mentioned by Prof. Moss, IT security threats are more and more focused on the robbery of valuable data. Frequently, there are malicious codes or malware that pass through our security systems when we access...

Words: 1036 - Pages: 5

Premium Essay

Cyber Security

...| Cyber Security | | Patrice Brockington | 4/20/2013 | | Cyber Security The security of online files, applications, documents, consumer information, and organization information are just some of the valued items that need to be secure from cyber threats. Companies and organization that utilize the internet to conduct business know all too well the importance of securing the information and any and all information of those that they do business with. Having some general knowledge of what cyber security is and the importance of it is our purpose in this brief. Cyber security is the “measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack”, as defined by Merriam-Webster.com (Online, 2013). In general practice cyber security is simply securing online information and service systems. If you ever entered your name, address or any personal information online or into some database to win a prize this information is online or somehow accessible via the Internet. It is this type of information that so many millions of people are concerned about if it is secure or not, since it is out on the Internet. “The nation’s critical infrastructure relies heavily on the Internet for everything from submitting taxes, to applying for student loans, to following traffic signals, to even powering our homes” (Government, 2013). This is why cyber security is one of this country’s most important national security priorities...

Words: 645 - Pages: 3

Premium Essay

Maintaining Information Systems Security

...Maintaining Information Systems Security Akilah S. Huggins University Of Phoenix CMGT/400 August 11, 2014 Maintaining Information Systems Security Introduction With the growing development of information systems and networks, security is a main concern of organizations today. The fundamental objectives of information systems security are privacy, integrity, and accessibility. The foundation of organization's security lies in planning, creating and actualizing proper information systems' frameworks' security strategy that adjusts security objectives with the organization's requirements. In this paper the objective is to describe the importance of policies and standards for maintaining information systems security. Specifically, the paper include the discussion of the role employees—and others working for the organization to maintain the information systems security. Also the position paper aim to examine the different levels of security and how an organization can provide the proper level of effort to meet each information security need and how this relates to what is in an organization’s information security policy. Thesis Statement The aim and objective of the underlying paper is to analyze and evaluate the phenomena of maintaining information system security. Importance of Policies and Standards for Maintaining Information Systems Security. Information system security policies primarily address threats. The...

Words: 1235 - Pages: 5

Premium Essay

It-255

...IT255 Introduction to Information Systems Security Unit 5 Importance of Testing, Auditing, and Monitoring © ITT Educational Services, Inc. All rights reserved. Learning Objective Explain the importance of security audits, testing, and monitoring to effective security policy. IT255 Introduction to Information Systems Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Role of an audit in effective security baselining and gap analysis  Importance of monitoring systems throughout the IT infrastructure  Penetration testing and ethical hacking to help mitigate gaps  Security logs for normal and abnormal traffic patterns and digital signatures  Security countermeasures through auditing, testing, and monitoring test results IT255 Introduction to Information Systems Security © ITT Educational Services, Inc. All rights reserved. Page 3 EXPLORE: CONCEPTS IT255 Introduction to Information Systems Security © ITT Educational Services, Inc. All rights reserved. Page 4 Purpose of an IT Security Assessment Check effectiveness of security measures. Verify access controls. Validate established mechanisms. IT255 Introduction to Information Systems Security © ITT Educational Services, Inc. All rights reserved. Page 5 IT Security Audit Terminology  Verification  Validation  Testing  Evaluation IT255 Introduction to Information Systems Security © ITT Educational Services, Inc. All rights reserved...

Words: 799 - Pages: 4

Premium Essay

Introduction to Computer Security

...to Computer Security CSE 3482 Introduction to Information/Computer Security Instructor: N. Vlajic, Winter 2014 Learning Objectives Upon completion of this material, you should be able to: • Describe the key security requirements of confidentiality, integrity and availability (CIA). • Describe the CNSS security model (McCumber Cube). • Identify today’s most common threats and attacks against information. • Distinguish between different main categories of malware. Required Reading Computer Security, Stallings: Chapter 1 Computer Security, Stallings: Chapter 6 Introduction • Information Technology – technology involving development & use of computer systems & networks for the purpose of processing & distribution of data  in many organizations, information/data is seen as the most valuable asset categories of IT jobs:  IT administrator - installs, maintains, repairs IT equipment  IT architect - draws up plans for IT systems and how they will be implemented  IT engineer - develops new or upgrades existing IT equipment (software or hardware)  IT manager - oversees other IT employees, has authority to buy technology and plan budgets  Introduction (cont.) • Information System – entire set of data, software, hardware, networks, people, procedures and policies that deal with processing & distribution of information in an organization  each component has its own strengths, weaknesses, and its own security requirements information is - stored...

Words: 1194 - Pages: 5

Free Essay

Information Systems

...Information System & Security in the Work Environment Secereal Bernard BIS/221 August 24, 2015 Steven Goldstein MEMORANDUM TO: All Employees FROM: Corporate Office DATE: August 24, 2015 SUBJECT: Information Systems & Security CC: Board of Directors Information Systems and information security are two of the most important issues that are in the work environment. To be able to understand the importance of a feature, first you must understand what it is. As you read along, you will have a better understanding of the importance of information systems and security in a work environment. Information Systems Information systems can be defined as a collection of data, people, processes, communications, and technology that work together to support and help improve the everyday functions of running a business. Information systems has advanced in its development over the past years. Whereas in the early 80s Information Systems way of collecting data and communication was so unprivileged. Most companies use far advance systems that hold, send and distribute information. Advanced systems have changed most company’s position in their respective market place. Communication Information system has changed the way companies are able to conduct their business in various ways over time. Companies are able to reach out to their management team as well as clients. Part of management is being able to gather and distribute information efficiently to other...

Words: 898 - Pages: 4

Premium Essay

Financial Reporting Environment

...Information presented in financial statements is of critical importance to external decision mak- ers. Financial statements affect the prices paid for equity securities and interest rates attached to debt securities. To the extent that financial performance and condition are accurately com- municated to business decision makers, debt and equity securities are more accurately priced. By extension, financial reporting plays a crucial role in efficient resource allocation within and across economies. Accounting information contributes to the efficient operation of securities markets, labor markets, commodity markets, and other markets. To illustrate, imagine the consequences of a breakdown in the integrity of financial report- ing. The Enron scandal provides a case in point. At the beginning of 2001, Enron was one of the most innovative and respected companies in the United States. With revenues of over $100 billion and total company value of over $60 billion, it was the fifth largest U.S. corporation based on market value. In October 200 I, the company released its third quarter earnings report to the public. Although operating earnings were higher than in previous years, the income state- ment contained a $1 billion "special charge." Financial analysts began investigating the cause of this charge and discovered that it was linked to related-party transactions and questionable accounting practices. Once it became clear to the capital markets that Enron had not faithfully and accurately...

Words: 340 - Pages: 2

Free Essay

It Frameworks

...given corporation; most likely every department is in some way using IT to improve current processes, assist in financial reporting, expand and create new processes, etc. Given the extensive use of the advanced IT capabilities of today, a need for the IT security objectives and business objectives to align is created. The Information Technology Governance Institute (ITGI) illustrates this best in the statement, “While many organizations recognize the potential benefits that technology can yield, the successful ones also understand and manage the risks associated with implementing new technologies.” This is where IT Governance comes in to play. As highlighted in Dr. Steven Hornik’s September 22nd presentation on frameworks, there is a disconnect between the need for IT Governance and the practices of corporate executives. This research paper will be geared toward the education of corporate executives on IT Governance, various frameworks available for use, and the importance of knowledge and implementation due to accounting regulations. There will be 4 key elements covered: Introduction to Enterprise and IT Governance and the frameworks available, the importance of integrating accounting compliance regulations with IT security due to the Sarbanes-Oxley (SOX) act, a compare and contrast of the top frameworks with a compiled list of best practices from all the various frameworks, and finally a recommendation to executives. PART I. Stakeholders becoming increasingly concerned...

Words: 1341 - Pages: 6

Premium Essay

Is3232

...IS3230 Access Security Unit 1 Introduction to Access Control, Authentication, and PKI skong@itt-tech.edu k @itt t h d © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts Learning Objective Define authorization and access to an information technology (IT) infrastructure based on an access control policy framework. Key Concepts Access control policies, standards and procedures, and guidelines U.S. Federal d State U S F d l and St t compliance l li laws Fundamental access control concepts Identification, authentication Identification authentication, and authorization IS3230 Access Security © ITT Educational Services, Inc. All rights reserved. Page 2 EXPLORE: CONCEPTS IS3230 Access Security © ITT Educational Services, Inc. All rights reserved. Page 3 Access Control Enables an authorized person to control access to areas and resources in a given physical facility or computer-based information system IS3230 Access Security © ITT Educational Services, Inc. All rights reserved. Page 4 Primary Components of Access Control Policies: Defined from laws, requirements, and industry guides Subjects: People who need to access or are restricted from accessing Objects: Resources or information that need protection IS3230 Access Security © ITT Educational Services, Inc. All rights reserved. Page 5 Compliance Laws and Industry Guides Federal Laws State Government Laws Industry Guides IS3230 Access...

Words: 836 - Pages: 4

Free Essay

Beth a Grillo - It540 Management of Information Security - Assignment - Unit 2

...Unit 2 Assignment: Security Policy Implementation Beth A. Grillo, MHA, CPC-A July 19th, 2016 IT540-01: Management of Information Security Dr. Kenneth Flick Kaplan University Table of Contents Unit Two Assignment: Security Policy Implementation 3 Part 1: Step 29 3 Part 1: Step 36 3 Part 3: Step 33 4 Part 3: Significance of Strict Password Policy 5 Reference 6 Unit Two Assignment: Security Policy Implementation Part 1: Step 29 Part 1: Step 36 Part 3: Step 33 Part 3: Significance of Strict Password Policy When attempting to protect company information it is important to utilize strict password policies. According to a Guest Contributor on TechRepublic (2006), the need for “an effective password policy is to prevent passwords from being guessed or cracked”. According to Coconut Daily (2013), “Weak passwords are extremely vulnerable to cracking techniques such as a brute force attack, in which a cracker uses an automated tool to try every single possible password or key until the correct one is found. Brute force techniques are extremely effective at cracking short passwords or passwords in a limited search space (such as those based off a dictionary word)”. For example, when working in a medical practice the information being protected is patient personal information. The password policy needs to be strict according to the HIPAA laws. The personal information within the patient’s medical record requires strict password protection. If the...

Words: 297 - Pages: 2

Premium Essay

Com 156 Week 3 Outline

...not need to plan for retirement. Social Security will cover our needs when we are retired.” Thesis: Retirement is a time to break away from a hectic schedule and enjoy life. Retirement also can be a time of change and unexpected challenges. Planning for retirement with a solid financial investment is the key to providing financial security for life’s “golden years.” Relying solely on Social Security benefits to fund your retirement will place your financial security at risk. Organization: Order of importance. Purpose and audience: To show a solid financial plan for retirement is possible at any age, and the importance of not relying on Social Security as a sole means of taking care of day-to-day expenses. This essay is intended for an audience interested in learning how to make wise choices for their retirement, especially those who are planning to rely on Social Security benefits only. I. Relying solely on Social Security to fund for retirement may be a recipe for financial failure. A. Current research states the Social Security fund may be depleted of funds by the time most people are ready to retire in the next ten (10) years. B. Provide government statistics indicating current rate of payouts as opposed to program’s available funds. C. Current economic research showing of increasing cost of living expenses versus Social Security benefit increases, or lack thereof. II. Relying solely on Social Security benefits can have other far-reaching effects...

Words: 705 - Pages: 3