Verified Document

Keeping Information Secure Research Paper

Keeping Information Secure Information Systems

If I were the Chief Intelligence Officer for an organization, there would be a number of things I would do to keep my organization's information secure. I would first make sure I had an extremely comprehensive knowledge of the kind of technology that best serves my organization. The kind of precautions a CIO must need to take are in part contingent on the kinds of technology and the kinds of information that need to be secured. Not all information systems are the same and they all do not serve the same function, though clearly there are general commonalities. Walton suggests that for all organizations, these five steps should be as follows:

Establishing and maintaining a meaningful and relevant security policy; Ensuring that...

(Walton, 2001)
Each organization should have a very transparent security policy. The security policy should be clear, stringent, and with specific consequences for security breaches as well as improvement to security. Furthermore, the IT staff, specifically, must be well trained, well supported, and kept up-to-date regarding security policies and relevant technologies to uphold the security policy. Whitman (2003) additionally contends that organizational information security also depends on accurately assessing and categorizing the kinds of threats are present and likely…

Sources used in this document:
References:

Walton, M. (2001). Five ways to secure your organizations information systems. Tech Republic, Web, Available from: http://www.techrepublic.com/article/five-ways-to-secure-your-organizations-information-systems/1060329. 2012 November 14.

Whitman, M.E. (2003). Enemy at the Gate: Threats to Information Security. Communications of the ACM, 46(8), 91 -- 95.
Cite this Document:
Copy Bibliography Citation

Related Documents

Information Systems Management Information Systems
Words: 705 Length: 2 Document Type: Research Paper

Cloud computing is a trend in technology providing cost control and real agility business benefits. Nevertheless, services based on cloud computing are currently floating outside privacy and security standards, which is likely to be decades old thus failing to address concerns such as shared tenancy and virtualization (Gibson, 2011). Similarly, cloud computing comes with more challenges; providers of cloud services are likely to outsource third party experts and if such

Customer Information Secure and Assessing
Words: 770 Length: 2 Document Type: Term Paper

The Cincom CRM system also has areas where the sales teams can also enter in total contract value and the total budget for a given initiative as well. Both internally gained financial information from within the customer and the reported financial results, more easily obtained if the customer is publicly held, go into deciding which customers are the most worth investing in over time. There are also analyses completed

Keeping Information Technology Safe
Words: 2651 Length: 8 Document Type: Essay

Installation The author of this report has been presented with a hypothetical situation as ZXY Corporation where a new building has been procured. This building will be the site of the new information technology (IT) and other infrastructures. However, the current setup is very raw and unfinished and this obviously needs to change. The facets of the information technology setup that will be addressed in this report will include a

Health Information and Health
Words: 1396 Length: 3 Document Type: Essay

Healthcare Delivery Systems and Informatics Meaningful Use (MU) Under the HITECH Act (2009) financial incentives were offered to physician practices and hospitals who adopted certified electronic health record (EHR) systems and used this technology to improve quality, safety, and efficiency in patient care. This is referred to as "meaningful use". To receive incentives, providers must provide evidence they are meaningfully using their EHR's by meeting a number of identified objectives. Use

Information Technology Change Management in Home Health
Words: 1391 Length: 5 Document Type: Essay

Information Technology Change Management in Home Health Care I hope enjoyed time holidays. Now back work . In team task week, a topic weekly focus debate paper labor unions change process. There sufficient information argue sides. Let . See: The labor union change process difficult employees management; I labor union make process a bit easier parties. Implementing Information Technology Change in a Health Care Facility There is a shift from the traditional institutionalized

Information Technology Refuting the Claims
Words: 3173 Length: 12 Document Type: Thesis

Linux Kernel Analysis Much has been written in praise of the Linux (Crandall, Wu, Chong, 359), (Parnas, 112), (Baliga, Iftode, Chen, 323), and its use of preemptive multitasking memory architectures to manage process control, file management, device management, information maintenance and communications subsystems securely and effectively. The Linux modular design, lack of reliance on Remote Procedure Calls (RPC), and use of UNIX-based system administration all are often cited as factors in how

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now