Verified Document

Information Classification And Security Models Essay

¶ … classification and risk analysis are some of the major initiatives that companies consider to be very expensive and unwarranted in relation to protection measures to business need. As a result of this consideration, organizations prefer seeking information technology support organizations to identify information that needs protection and the degree of protection as well as the technology solution. However, information classification is still an important protection measure to business need because of the need to secure different types of information in different ways. Information classification can be described as the process of categorizing information, establishing a policy on how to handle information based on its category, and developing security measures on systems handling information accordingly. The classification of the information in order to determine protection measures to business need is dependent on the nature and type of the business or company. The need for information classification in the modern business world is because of the increasing significance of information to business...

The preference for information technology measures usually contributes to ineffective and inefficient technology centered on information protection plans that do not specifically deal with a firm's business need.
Information classification is important for organizations because the need to protect information is more important today than ever before in light of rapid technological advancements (Fowler, p.3). Secondly, the need for protection is obvious while the solutions are not because of complexity of information, challenges in protecting information, and sophistication of technology. Therefore, information classification will help the management to ensure company information is protected.

Types of Security Architecture & Design Models:

Security architecture and design is a domain that is made of concepts, standards, principles, and structures used to develop, implement, evaluate, and secure various technological aspects including operating systems, applications, network, and equipment. The domain also incorporates controls used to ensure levels or degree…

Sources used in this document:
Works Cited:

Fowler, Susan. "Information Classification -- Who, Why and How." SANS Institute InfoSec Reading Room. SANS Institute, 28 Feb. 2003. Web. 9 May 2014. <http://www.sans.org/reading-room/whitepapers/auditing/information-classification-who-846>.

Ouyang, Alfred. "Security Architecture & Design Domain." CISSP Common Body of Knowledge Review. Creative Commons, Jan. 2012. Web. 9 May 2014. <http://opensecuritytraining.info/CISSP-2-SAD_files/2-Security_Architecture+Design.pdf>.
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Policy of a Dental
Words: 1254 Length: 3 Document Type: Term Paper

SECURITY and PRIVACY - the following security and privacy requirements apply: The Office does not accept responsibility for the privacy, confidentiality or security of data or information not generated by this office or transmitted from external sources into the system. The Office does not accept responsibility for loss, corruption, misdirection or delays in transmission of personal data through the system. Users are responsible for the integrity of all data and

Security Awareness the Weakest Link
Words: 8202 Length: 30 Document Type: Case Study

To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not

Security Architecture & Design Models:
Words: 889 Length: 2 Document Type: Article Review

A security policy is indicated by Harris (2010) to be a set of rules as well as practices that dictates how sensitive information is to be protected, managed as well as distributed while a security model is a mere symbolic representation of the security policy. The following are the security models in use. Lattice Models This security model is based on a mathematical construct that is hugely base don the group

Security Issues of Online Communities
Words: 15576 Length: 60 Document Type: Term Paper

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Security and Online Privacy Regulations:
Words: 5553 Length: 20 Document Type: Research Proposal

" (Muntenu, 2004) According to Muntenu (2004) "It is almost impossible for a security analyst with only technical background to quantify security risk for intangible assets. He can perform a quantitative or qualitative evaluation using dedicated software to improve the security of the information systems, but not a complete risk assessment for the whole information system. Qualitative assessment based on questionnaires use in fact statistical quantitative methods to obtain results. Statistical

Information Security Evaluation for OSI Systems a Case Study
Words: 4698 Length: 10 Document Type: Case Study

OSIIT An analysis of IT policy transformation The aim of this project is to evaluate the effectiveness of information security policy in the context of an organization, OSI Systems, Inc. With presence in Africa, Australia, Canada, England, Malaysia and the United States, OSI Systems, Inc. is a worldwide company based in California that develops and markets security and inspection systems such as airport security X-ray machines and metal detectors, medical monitoring anesthesia

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now