Premium Essay

Protecting Information Assets

Submitted By
Words 233
Pages 1
The protection of information assets in my personal life is of great importance to future and success of my family. Risk of public exposure drives the need for information security (Price, 2003). Creating an inventory of information assets in my personal life includes a multitude of items I consider confidential. Information assets first must be identified, categorized, classified, and assigned a value (Whitman & Mattord, 2013). The items have the potential to impact our future financial situation and privacy. In order of importance, the social security numbers of my children and myself are considered confidential a high level of priority. The financial accounts the family possesses would follow having a confidential classification with a

Similar Documents

Premium Essay

Cmgt 410 Week 2 Individual

...Protecting information and all assets is critical in today’s time. The military faces three major types of threats: Employees, Zero-Day Exploits, and Cyber Espionage. It is imperative, due to the information and assets on-hand, that the military mitigates these risks. The first major threat, employees, is a very common threat to all organizations. Employees can be broken down into three types of threats which include, employees that are careless and untrained, employees that are tricked or fall prey to social engineering, and employees with malicious intentions. This will always be a potential threat because every organization requires employees to run and function. Protecting a network and data should be top priority for every organization. With policies, procedures, and training implemented, employees will have a better understanding of what is allowed on their organization’s network, how to properly navigate the system, and how to safeguard all information contained within the network. Policies and procedures also inform employees of what practices are in the event information is disclosed without authorization and any and all penalties that may go along with them. Having this information readily available to employees ensures they are aware the organization is serious about protecting all assets and information and will enforce legal action if needed. Since employees are the individuals that have access to all information, some of which is sensitive, they need to understand...

Words: 1178 - Pages: 5

Premium Essay

Assets

...Asset plays a vital role for the sustainability of the company and it is the main financial instruments of the company however we can’t find more enough about asset figure in accounting field. Since total assets are one of the central concepts of accounting, this essay is going to address the term of assets its measurement, the problem arises due to addityvity, categorisation and treatment of asset and the qualitative characteristic of standards. Assets are categories in current assets and noncurrent, tangible and non tangible assets. As these assets are categories differently as a same way there are different measurement basis of assets. There are different ways of measurement for the assets but still there is a problem of addivity. This problem arises when there are different types of assets in the company and measurement for all assets is in same basis. These cause the problem of addivity because we can’t add different asset by the same measurement method. Company have to measure according to the nature of asset . Accounting standard board has prepared qualitative characteristics of financial information such as faithful representation, relevance, understandability, timeliness, comparability and verifiability which are helpful while making measurement decision in the company. Most important assumptions in decision making process and improvement economy is existence of quality financial information. Significant number of this information comes from accounting information systems...

Words: 374 - Pages: 2

Premium Essay

Assignment 2 Critical Infrastructure Protection

... and customs and exchange.  The process that defines homeland security missions and incorporates the key concepts is the Quadrennial Homeland Security Review (QHSR). DHS missions are spread across the enterprise and do not only cover DHS.  The delegated missions define in detail how to prevent, protect, respond, recover, secure, ensure resilience, and facilitate customs and exchange as noted by (dhs.gov, 2013).     Department of Homeland Security operations encompass five core objectives.  The objectives covered under DHS are prevention of terrorism and enhancing security; secure and manage our boarders; enforce and administer immigration laws; safeguard and secure cyberspace; ensure resilience to disasters stated in (dhs.gov, 2013).  Protecting Americans from terrorist threats is the highest priority for DHS through prevention of terrorist attacks, Initiating rigorous screening of cargo, global aviation security, and enhancing national preparedness levels for state and local law enforcement....

Words: 1685 - Pages: 7

Premium Essay

Unit 9 Discussion 1: Risk Analysis

...Gustavo Ochoa John Webb Dani Deandresi Unit 9 Discussion 1: Risk Analysis To protect information, businesses need to implement rules and controls for the protection of information and the systems that store and process this information. This is achieved through the implementation of information security policies, standards, guidelines and procedures. This document states how a company will protect its physical and information assets. It is a living document, meaning that the document is never finished. This document can include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company’s assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy. A security policy should be written by senior management. This plan also outlines security roles and responsibilities. System characterization is used to expedite the risk analysis. It is the process of identifying which information assets need protecting either because of their criticality to the business and/or because ePHI is processed and stored on the system. This process includes conducting an inventory of major applications and general support systems—any systems that process or store PHI. A major application is an application that is critical to an organization or stores PHI. Generally, the “owner” for a major application is the director of the department that...

Words: 350 - Pages: 2

Premium Essay

Critical Infrastructure Protection

...The summary determines Critical Infrastructure Protection (CIP) is an important Cyber Security initiative that requires careful planning and coordination in protecting our infrastructure: 1. What is the Department of Homeland Security’s Mission, Operations, and Responsibilities? 2. What is the Critical Infrastructure Protection (CIP) initiatives are; what are protected, and the methods used to protect our assets? 3. What are the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure? 4. Evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure. 5. Three methods to improve the protection of our critical infrastructure DHS’s Mission The Homeland Security Act of 2002 created the Department of Homeland Security (DHS) began operations in 2003 it assigned the department the following critical infrastructure protection responsibilities it’s goals and objectives are to prevent, to protect, to respond, and to recover, as well as to build in security, to ensure resilience, and to facilitate customs and exchange. DHS core mission consist of five homeland security missions “Prevent terrorism and enhancing security; Secure and manage our borders; Enforce and administer our immigration laws; Safeguard and secure cyberspace; Ensure resilience to disasters” (DHS.gov) Homeland security is a widely distributed and diverse refers to the collective efforts and shared responsibilities...

Words: 1936 - Pages: 8

Premium Essay

Importance Of Intellectual Property

...India. For that, the data and information is collected from news papers, articles, magazines, internet websites, and expert interviews. Protecting intellectual property with patents provides the exclusive rights by law to the assignees or originator to make use of and exploit their inventions. The invention which meets the novelty, non-obviousness, usefulness in the industry, enabled etc criteria’s as per Indian patent act and fulfilling patentable criteria’s...

Words: 742 - Pages: 3

Premium Essay

Security Organizations

...Organizations The 9/11 incident resulted to the prioritization of security on top of other priorities in many organizations for the purpose of protecting or guarding itself against the occurrence of risks or threats. Security being defined as freedom from risk or danger makes it difficult to measure the attributes that surround its values since it is measured with what did not happen or take place. In the setting of an organization, security can be viewed as the system of service that involves the utilization of people and appropriate tools and an intelligently-designed system of procedures and policies that deter the occurrence of risks or threats that result from personal faults, emergencies, criminal acts, and other disasters (Ortmeier, 2013). Security programs enable organizations or government to identify risks and threats and accordingly enable them to take countermeasures to protect itself. Organizations make use of various tools in formulating its security programs like laws, information technology, investigation, and other methodologies in making sure that frauds are detected, rehabilitation is carried out after every disaster, businesses are in place, trading are not stopped and energies are efficiently utilized after every occurrence of threats and risks. An organization's security program is also designed to protect its information technology and all other forms of violence. It can be said therefore that security programs affect each citizen's daily living, and every...

Words: 942 - Pages: 4

Premium Essay

Principles of Information Security Chapter 1

...Principles of Information Security, 4th Edition 1 Chapter 1 1 Review Questions 1. What is the difference between a threat agent and a threat? A threat agent is the facilitator of an attack, whereas a threat is a category of objects, persons, or other entities that represents a potential danger to an asset. Threats are always present. Some threats manifest themselves in accidental occurrences and others are purposeful. Fire is a threat; however, a fire that has begun in a building is an attack. If an arsonist set the fire then the arsonist is the threat agent. If an accidental electrical short started the fire, the short is the threat agent. 2. What is the difference between vulnerability and exposure? Vulnerability is a weaknesses or fault in a system or protection mechanism that opens it to attack or damage. Exposure is a condition or state of being exposed. In information security, exposure exists when a vulnerability known to an attacker is present. 3. How is infrastructure protection (assuring the security of utility services) related to information security? The availability of information assets is dependent on having information systems that are reliable and that remain highly available. 4. What type of security was dominant in the early years of computing? In the early years of computing when security was addressed at all, it dealt only with the physical security of the computers themselves and not the data or...

Words: 4896 - Pages: 20

Free Essay

Cis 502 Critical Infrastructure Protection

...CIS 502 Critical Infrastructure Protection Click Link Below To Buy: http://hwaid.com/shop/cis-502-critical-infrastructure-protection/ Due Week 6 and worth 50 points Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure. The following documents titled, “National Infrastructure Protection Plan”, and “Critical Infrastructure Protection”, may be used to complete the assignment. Write a three to five (3-5) page paper in which you: 1. Examine the Department of Homeland Security’s : a. mission b. operations c. responsibilities 2. Explain what Critical Infrastructure Protection (CIP) initiatives are, what are protected, and the methods used to protect our assets. 3. Describe the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure. 4. Evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure. 5. Suggest three (3) methods to improve the protection of our critical infrastructure and justify each suggestion. 6. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times...

Words: 1288 - Pages: 6

Premium Essay

Benefits and Pitfalls of Information Security in an Office Environment

...Benefits and Pitfalls of Information Security in an Office Environment Daniel Miller Troy State University Benefits and Pitfalls of Information Security in an Office Environment Introduction Information security is a critical concern in most, if not all modern office environments. Moreover, the more an organization depends on information technology to execute its core functions, the more important information security proportionally becomes (Tiwari & Karlapalem, 2005). Although companies have always recognized the importance of protecting sensitive information, the particular issue of information security is largely an outgrowth of the invention of modern computers. Starting during World War II, computer scientists and operators began to recognize the major contours of modern information security systems: protection of physical premises, hardware, and software (Whitman and Mattord, 2010, p. 3). Today, information security practices are prevalent across all forms of business and government, especially where personal computers and the Internet are used. Typical office and business environments are natural sites for information security to be implemented, and such practices have both advantages and disadvantages—or benefits and pitfalls. The benefits of information security in office environments are primarily related to its ability to contribute to business success by securing systems, data, and other key assets from threats and attacks. Conversely, the...

Words: 2757 - Pages: 12

Premium Essay

Riordan Security Analysis

...CMGT 582 Security and Ethics August 27, 2012 Riordan Manufacturing Security Analysis Executive Summary With today’s businesses and the global competition, a company needs to protect business information secure and place classifications on information and the information systems. The following executive summary is regarding Riordan Manufacturing (RM) with a complete security analysis for how secure the organization’s information systems are. The security analysis will review a security risk assessment, security controls, and the company policies and government mandates for regulations regarding legal and ethical issues for information systems. One of the first steps to completing a security analysis is to performing an audit for the following: * Identify security best practices * Evaluate the current policies and effectiveness * Consider current and future legal and ethical issues * Security risk assessment * Security life cycle issues * * Configuration management, annual reviews, design, implementation Once the security audit is complete, RM can determine the level of effectiveness for security management and protecting the company’s major assets. The security audit will allow management to determine the top risk found during implementation and the best practices. The top risks and best practices found are from conducting the audit through observation, document review, interviews, and web-based questionnaires. The executive summary...

Words: 877 - Pages: 4

Premium Essay

Global Distribution, Inc (Cdi) Security Policy

... Security controls are the management, operational, and technical safeguards or countermeasures employed within an organizational information system to protect the confidentiality, integrity, and availability of the system and its information. This paper defines the elements and recommendations for use by the organization in protecting the information systems employed in conjunction with and as part of a well-defined and documented information security policy program. It is of importance that responsible officials understand the risks and other factors that could adversely affect organizational operations and assets, individuals and other organizations. These officials must also understand the current status of their security programs and the security controls plans are in place to protect their information and systems in order to make informed judgments at a an acceptable level. The ultimate objective is to conduct the day-to-day operations of the organization and to accomplish business functions with what Global Distribution, Inc defines as security balanced with limited results from unauthorized access, use, disclosure, disruption, modification, or destruction of information. Global Distribution, Inc (CDI) Security Policy The purpose of this plan is to ensure the confidentiality, integrity, and document the information policies and procedures for the entire Global Distribution Inc by providing resources that will support the goals and to allow the...

Words: 1408 - Pages: 6

Premium Essay

Disaster Recovery Plan

...Enhanced Security for Data Access | | Richard Edvalson 1/12/2014 | Contents I. Contents 1 II. Introduction 5 III. Access Control Layers 5 A. The Access Control Perimeter 5 B. Asset Containers 5 C. Workplace Perimeter 5 IV. Access Control Methods and Technical Strategies 5 A. Identification, Authentication, and Authorization 5 B. Logical Access Controls 5 1. Network Architecture Controls 5 2. Remote Network Access 5 3. Security Network Ports 5 4. Encryption 5 5. PKI Compliance Requirements 5 6. Passwords, Pins, and Other Forms of Access 5 C. Physical Access Controls 5 1. Classified Storage and Handling 5 2. Badges, Memory Cards, and Smartcards 5 3. Physical Tokens and Physical Intrusion Detection 5 V. Access Control Integration and Administrative Strategies 5 A. Biometric Systems 5 B. Separation of Duties 5 C. Protecting the Enrollment Process 6 D. Protecting the Verification Process 6 E. Cryptographic Controls 6 F. Integrating Access Control Methods 6 VI. Public Key Infrastructure 6 A. DoD-Approved PKI 6 B. Multi-factor Authentication 6 C. Identification and Authentication through Digit Signature of Challenge 6 D. Data Integrity through Digital Signature of the Information 6 E. Confidentiality through Encryption 6 F. Assists with Technical non-Repudiation through Digital Signatures 6 VII. Mitigating Risk in the User Domain 6 A. Interviewing and Background Screening...

Words: 590 - Pages: 3

Premium Essay

Project: Access Control Proposal

...Project: Access Control Proposal * Phase I: Risk mitigation plan to identify critical IT assets * Phase II: Policies and procedures for protecting the IT assets Contents I. Introduction 2 II. Diagram of the proposed solution 3 III. Phase I:Access Control Risk Mitigation 3 1. Identified Treats and vulnerabilities 3 2. IT assets 4 3. Treats and vulnerabilities per IT Domain 4 4. The System Security Team 5 5. Access Control Plan 5 IV. Phase II: Policies and procedures for protecting the IT assets 6 1) General Security Practices for VPN Remote Access 6 2. Protecting Cyber Assets: Secure Interactive Remote Access Concepts 7 2. How Employee Accesses the Corporate Network 9 3. How external Partners (Vendor) Access the Corporate Network 9 V. Conclusion 13 I. Introduction Access control mechanisms operate at a number of levels in a system, from applications down through the operating system to the hardware. Higher-level mechanisms can be more expressive, but also tend to be more vulnerable to attack, for a variety of reasons ranging from intrinsic complexity to implementer skill levels. Most attacks involve the opportunistic exploitation of bugs; and software that is very large, very widely used, or both (as with operating systems) is particularly likely to have security bugs found and publicized. Operating systems are also vulnerable to environmental changes that undermine the assumptions used in their design. The main function of access...

Words: 2458 - Pages: 10

Premium Essay

Finance Examination

...Questions and Solutions 3. In a corporation, what group has the ultimate responsibility for protecting and managing stockholder’s interests? A corporation’s top management has the ultimate responsibility of protecting and managing stockholder’s interests. There are essentially two groups responsible for protecting and managing the interests of stockholders being the Board of Directors and the top Management Team. However, the ultimately responsibility falls with the top management team, as they tend to be on hands-on in the daily operations of a business or a corporation. The top management team includes the Chief Executive Officer (CEO), Managing Director (MD), Chief Financial Officer (CFO) and all the rest of the top managers and leaders of the organization. They should know what is going on and be held accountable for not reporting shortcomings, expectations, news, and so on in a timely manner to the Board and also to corporate shareholders. In a corporation, the responsibility of the board of directors comes in when they have to determine strategic plans and objectives together with the top management, as well as reporting what management will have achieved in managing the company. Shareholders on the other end are waiting for results since they are the ultimate owners of a corporation, and since they cannot run the company, they bestow the ultimate responsibility of protecting and managing the shareholder’s (stockholder’s) interests with management of the company,...

Words: 2831 - Pages: 12