Information Security Essays (Examples)

1000+ documents containing “information security”.
Sort By:
By Keywords
Reset Filters

Example Essays

Essay
Security Information Security Is a Primary Concern
Pages: 2 Words: 809

Security
Information security is a primary concern for consumers and businesses. In "IT security fails to keep pace with the rise of cloud computing," the author claims that in spite of the advancements in cloud technology, information security has not kept pace. This assessment is rooted firmly in fact and best practices in the information security industry. Although their analysis is thorough, the authors would do well to point out the potential legal problems that arise due to the situation of poor security measures. As the Bureau of Consumer Protection points out, "Having a sound security plan in place to collect only what you need, keep it safe, and dispose of it securely can help you meet your legal obligations to protect that sensitive data." Companies and individuals who take advantage of cloud computing need to be aware of how the data being stored are also being protected against loss, manipulation,…...

mla

References

Bureau of Consumer Protection. Retrieved online:  http://business.ftc.gov/privacy-and-security/data-security 

Denning, D. (2000). Information warfare and security. EDPACS 27(9).

Dhillon, G. & Backhouse, J. (2000). Technical opinion: information system security management in the new millennium. Communications of the ACM 43(7).

Gordon, L.A. & Loeb, M.O. (2002). The economics of information security. Transactions on Information and System Security 5(4).

Essay
Security Information Security and Risk Management in
Pages: 5 Words: 1322

SECUITY
Information Security and isk Management in IT

This essay is designed to present and discuss both an assessment of information security and risk management in IT systems and a comparative discussion of important academic theories related to security and risk. In the first section, An assessment, a conceptual framework will emerge including reference to important terminology and concepts as well as an outline of legislation and authorized usage examples. In the second section, Comparative discussion, is a brief discussion of comparison on the academic theories.

Conceptual framework

To begin any work of this nature, it is important to clarify important terminology and concepts. First, an information technology (IT) system is also known as an application landscape, or any organism that allows for the integration of information and communication technology with data, algorithmic processes, and real people (Beynon-Davies, P., 2009 (1)(2)). Every organization consists of some type of IT system in which this integration…...

mla

References

Beynon-Davies, P. (2009)(1). The language of informatics: The nature of information systems. International Journal of Information Management. 29(2), 92-103.

Beynon-Davies, P. (2009)(2). Business Information Systems. Basingstoke: Palgrave Macmillan.

Coppersmith, Don. (1994). The data encryption standard (DES) and its strength against attacks. IBM Journal of Research and Development, 38 (3), 243-250. Retrived from Academic Search Premier.

Hubbard, Douglass. (2009). The failure of risk management: Why it's broken and how to fix it. United States: John Wiley and Sons.

Essay
Information Security Management
Pages: 2 Words: 549

Security Management
Information Security Management

Managing the information security at a major university is never an easy task, and especially with a team of only ten the complexities and the resource demands can sometimes make the situation seem all but impossible even on the best of days. When the former head of information security management suddenly departs as the result of an FBI arrest -- and when that arrest stems from the fact that this Chief Security Officer was a member of Anonymous, the most active and influential (so far as the public is aware, at least) cyber-terrorist group (as identified by law enforcement) -- the situation only becomes that much more difficult. As the interim Chief Security Officer newly in charge of ensuring university information security and with a team of employees ready to tackle the task, there are both immediate and long-term plans that need to be made and put…...

Essay
Security at Work Information Security Within the
Pages: 2 Words: 576

Security at Work
Information Security within the nursing fraternity

With the advent of consolidated information storage within the nursing fraternity, there has grown the need to have better security and controlled access to such information that may be considered confidential and for the use by the nurse and the patient alone. When anyone wants therefore to have access to the documents I will always need to verify several details just to be sure that the person has the direct permission of the patient to access such information or is mandated by the law to have such access by the virtue of the relationship with the patient. According to the HIPAA regulations, it is a legal requirement for the people within the medical fraternity to always protect the personal and private information of the clients since lack of doing so will mean a breach of the personal privacy rights. This privacy policy covers…...

mla

References

The Office of the national Coordinator for Health Information Technology, (2013). Guide to Privacy and Security of health Information. Retrieved June 9, 2013 from  http://www.healthit.gov/sites/default/files/pdf/privacy/privacy-and-security-guide.pdf

Essay
Information Security
Pages: 10 Words: 3704

Security
A broad definition of information security is given in ISO/IEC 17799 (2000) standard as:

"The preservation of confidentiality (ensuring that information is accessible only to those authorized to have access), integrity (safeguarding the accuracy and completeness of information and processing methods), and availability (ensuring that authorized users have access to information and associated assets when required" (ISO/IEC 17799, 2000, p. viii).

Prior to the computer and internet security emerged as we see it in different dimensions of today, the basic focus regarding security within majority of organizations was to protect physical assets. Those organizations where computers were being used in the initial years of computing, the security included protection of data from natural disasters or malevolent actions. With the introduction of the personal computer, computer security became the focus of the organizations.

Business organization and other institutions which hold intensive information require tenable management of information and it has become a major…...

mla

References

Bennet, C.J., and Regan, P.M. "Editorial: Surveillance and Mobilities," Surveillance & Society (1:4) 2004, pp 449-455.

Choi, N., Kim, D.J., and Goo, J. "Managerial Information Security Awareness' Impact on an Organization's Information Security Performance," 12th Americas Conference on Information Systems, Acapulco, Mexico, 2006.

Dhillon, G., and Torkzadeh, G. "Value-Focused Assessment of Information System Security in Organizations," Information Systems Journal (16:3) 2006, pp 293-314.

Dutta, A., & McCrohan, K. (2002), Management's role in information security in a cyber economy, California Management Review, Fall, Volume 45, Number 1, 67-87.

Essay
Information Security
Pages: 8 Words: 2352

Security
An institution of higher learning is one of the most vulnerable places to cyber-attacks available to hackers due to the number of units operating, lackadaisical security measures and the ability of hackers to hide in plain sight. The fact that these are vulnerable systems and individuals has made it a top priority of most institutions to ensure that the people who attend the school at least have a policy in place. Because ensuring security for all residents of a school would be very costly, most schools have a policy regarding their own equipment, but assume that students will guard their own equipment while they are at school. The problem with this is that there is a lot of file sharing between students and between individual students and others using flash drives and the school's computer systems. Therefore, it is very simple to inadvertently introduce a deadly pest into the…...

mla

References

Cisco Systems. (2007). Protecting and optimizing higher education networks: Cisco Campus Secure. Retrieved from  http://www.cisco.com/web/strategy/docs/education/CampusSecure_GP.pdf 

Consumer Reports. (2012). Security software ratings. Retrieved from   internet/security-software/security-software-ratings/ratings-overview.htmhttp://www.consumerreports.org/cro/electronics-computers/computers -

Krebs, B. (2003). A short history of computer viruses and attacks. Washington Post. Retrieved from  http://www.securityfocus.com/news/2445 

Parker, H. (2008). Attacks on computer memory reveals vulnerability of security systems. Princeton Weekly Bulletin, 97(18). Retrieved from  http://www.princeton.edu/pr/pwb/08/0303/security/

Essay
Information Security
Pages: 8 Words: 2504

Security
The following will look at case review questions based on the book known as Principles of Information Security by Michael E. Whitman. Chapters 4, 5, 6, and 7 were read through and case questions were given for each of these chapters. Case review question answers will be incorporated with material from the chapter reading that accompanies it.

Chapter 4's introduction has a scenario of a man known as Charlie. He is giving key reminders for everyone in the asset identification project. They are to complete their asset lists while keeping in mind certain priorities. It ties into the idea of chapter 4 which is known as risk management and identifying risks along with assessing them (Whitman and Mattord, 2011-page 116). It also explains how one can perpetuate risk control. isk management itself refers to a process that identifies risk or vulnerabilities to the organization and taking steps to reduce the…...

mla

Reference"

Whitman, M., & Mattord, H. (2011). Principles of Information Security (4th ed.). Cengage Learning.

Essay
Information Security
Pages: 4 Words: 1130

DMCA
The Digital Millennium Copyright Act (DMCA) is a controversial United States digital rights management law enacted October 28, 1998. The intent behind the DMCA was to create an updated version of copyright laws to deal with the special challenges of regulating digital material. roadly, the goal of the DMCA is to protect the rights of both copyright owners and consumers. The law complies with the World Intellectual Property Organization (WIPO) Copyright Treaty and the WIPO Performances and Phonograms Treaty, both of which were ratified by over fifty countries in 1996.

This paper discusses the controversy surrounding the DMCA and why attempts to resolve these issues are now necessary.

The impact of the DMCA on organizations is far reaching. Key highlights include the DMCA's enforcement to:

Make it a crime to circumvent anti-piracy measures built into most commercial software.

Prevent the manufacture, sale, or distribution of code-cracking devices used to illegally copy software. Cracking of…...

mla

Bibliography

'Digital Millennium Copyright Act." TechTarget. 27 Oct. 2004. .

Rapoza, Jim. "Fair (Use) Is Fair." eWeek 24 May 2004. 27 Oct. 2004. .

"Reverse Engineering." Chilling Effects. 27 Oct. 2004. .

"The Digital Millennium Copyright Act." The UCLA Online Institute for Cyberspace Law and Policy. 27 Oct. 2004. .

Essay
Security Policy The Information Security Environment Is
Pages: 4 Words: 1208

Security Policy:
The information security environment is evolving because organizations of different sizes usually experience a steady stream of data security threats. Small and large business owners as well as IT managers are kept awake with various things like malware, hacking, botnets, and worms. These managers and business owners are usually concerned whether the network is safe and strong enough to repel attacks. Many organizations are plagued and tend to suffer from attempts to apply some best practices or security paralysis on the belief that it was efficient for other companies or organizations. However, none of these approaches is a balanced strategy for safeguarding information assets or maximizing the value obtained from security investments (Engel, 2012). Consequently, many organizations develop a coherent data and information security policy that prioritizes and handles data security risks. Some organizations develop and establish a formal risk assessment process while others pursue an internal assessment.

Analyzing…...

mla

References:

"Data Recovery Overview." (2010, December 6). Presentations & Resources. Retrieved August

2, 2012, from  http://www.myharddrivedied.com/presentations-resources/data-recovery-overview 

"EMC Information Risk Assessment." (2008, December). EMC Corporation. Retrieved August

2, 2012, from  http://www.emc.com/collateral/services/consulting/h5990-information-risk-assessment-svo.pdf

Essay
Information Security Management
Pages: 7 Words: 1948

Security Management
During the span of one's college career, a select number of courses become something more than a simple requirement to be satisfied to assure graduation; these are moments in a student's educational process which make the most lasting impacts. In my personal case, the lessons I have learned as part of my studies in ISSC680 will likely be remembered in those terms, as my eventual career will find me utilizing much of the foundational knowledge I gained in this course on a daily basis. As an aspiring information security officer, who hopes to apply the skills imparted throughout my time in ISSC680 during my professional career, I am sure that when I reflect on my college experience this class will stand out above the rest in terms of significance. The two textbooks which have provided detailed instruction on the field of information security, Information Security Fundamentals and Information…...

mla

References

Anderson, K. (2013). Can we make security awareness training stickier?. Information Systems Security Association Journal, January '13. Retrieved from http://c.ymcdn.com/sites/www.issa.org/resource/resmgr/journalpdfs/feature0113.pdf

Computer Security Institute. (2012, November 11). About the computer security institute (csi). Retrieved from  http://gocsi.com/mission 

Johnson, M.E., & Goetz, E. (2007). Embedding information security into the organization. IEEE Security & Privacy, May/June. 16-24. Retrieved from  http://digitalstrategies.tuck.dartmouth.edu/cds-uploads/publications/pdf/SecurityOrg.pdf 

Layton, T.P. (2007). Information security: Design, implementation, measurement, and compliance. (6 ed.). New York, NY: CRC Press.

Essay
Security Programs Implementation of Information Security Programs
Pages: 4 Words: 1415

Security Programs
Implementation of Information Security Programs

Information Security Programs are significantly growing with the present reforms in the United States agencies, due to the insecurity involved in the handling of data in most corporate infrastructure systems. Cases such as independent hackers accessing company databases and computerized systems, computer service attacks, malicious software such as viruses that attack the operating systems and many other issues are among the many issues experienced in the corporate arena, including government agencies like the U.S. Department of Health and Human Services. These cases have led to the necessity for more implementation of the information security programs, which provide counter measures for the information security threats.

The United States Department of Health and Human Services

The Department of Health and Human Services in the United States (HHS) is one of the principal agencies obliged to protect the health conditions of the entire American population and also providing the…...

mla

References

Onsett International Corporation. (2001 September). Building Comprehensive Information Security Programs. Retrieved from www.onsett.com/.../...

HHS.gov. (2004 December 15). Information Security Program Policy. Retrieved from www.fas.org/sgp/othergov/hhs-infosec.pdf

SANS Institute: Security Laboratory. (2007 August 15). Configuration Management in the Security World. Retrieved from www.sans.edu/research/security-laboratory/.../meyer-config-manage

HHS.gov. (2010 April 5). Policy of Information Technology (IT): Security and Privacy Incident Reporting and Response. Retrieved from www.hhs.gov/ocio/policy/policydocs/hhs_ocio_policy_2010_0004.doc - 11k

Essay
Information Security Training Program
Pages: 12 Words: 3414

Federal Information Security Management Act (FISMA)
The Federal Information Security Management Act places emphasis on the importance of training and awareness program and states under section 3544 (b).(4).(A), (B) that "security awareness training to inform personnel, including contractors and other users of information systems that support the operations and assets of the agency of- information security risks associated with their activities; and their responsibilities in complying with agency policies and procedures designed to reduce these risks"

easons for training and awareness program:

Information security awareness and training is one of the most critical aspects of an organization's information security strategy and supporting security operations (Maconachy, n.d. This is due to the fact that people are in many cases the last line of defense against threats, such as malevolent code, discontented employees, and malicious third parties, which introduce costly tangible and intangible losses to organizations. Therefore, people need to be educated on what an…...

mla

References:

Burns, G.M, n.d. A Recipe for a Decentralized Security Awareness Program. ISSA Access. Vol. 3,

Code of Federal Regulations. 5 CFR 930. Computer Security Training Regulation.

Flanders, D, n.d. Security Awareness - A 70% Solution. Fourth Workshop on Computer Security

Isaacson, G, 1990. Security Awareness: Making It Work. ISSA Access. 3(4). pp. 22-24.

Essay
IT Strategy for Information Security
Pages: 7 Words: 2253

Information Security Strategy The world of information technology (IT) has evolved tremendously in the last few decades. Today, IT systems permeate virtually every aspect of work in the organizational setting – from strategic planning functions to administrative and operational functions such as human resource management, payroll management, project management, procurement, customer relationship management, and financial management. These systems have enabled organizations undertake a wide variety of tasks with far greater ease, effectiveness, and efficiency than ever witnessed. Nonetheless, with more dependence on IT systems, organizations increasingly face a significant problem – information security (Andress, 2011). Against the backdrop of growing incidents of hacking and other cyber crimes, protecting information has become a top priority for organizations – small and large – in diverse sectors and industries (Vacca, 2013). Indeed, information security has been identified as a key ingredient of organizational success in the 21st century. Recent incidents of cyber crime –…...

mla

References

Andress, J. (2011). The basics of information security: Understanding the fundamentals of infosec in theory and practice. New York: Elsevier.

Conklin, A., & McLeod, A. (2009). Introducing the Information Technology Security Essential Body of Knowledge framework. Retrieved from

Shankdhar, P. (2017). 22 popular computer forensics tools. InfoSec Institute. Retrieved from http://resources.infosecinstitute.com/computer-forensics-tools/#gref

Stallings, W. (n.d.). Standards for information security management. CISCO. Retrieved from https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-38/104-standards.html

U.S. Department of Homeland Security. (2008). Information Technology (IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Framework for IT Security Workforce Development. Washington, D.C.: U.S. Department of Homeland Security, National Cyber Security Division.

Vacca, J. (2013). Computer and information security handbook. New York: Elsevier.

Whitman, M., & Mattord, H. (2017). Principles of information security. 6th ed. Boston: Cengage Learning.

http://www.amcleod.com/mcleod8.pdf

Essay
Cyber Crime IT Security Auditing
Pages: 11 Words: 3165

Abstract Cybercrime, data breaches, and fraud represent evils that significantly threaten businesses. Companies have, in the past, lost much to these crimes and, hence, must come up with plans to prevent such future occurrences. In this paper, the processes information technology security audits entail and how such audits enhance organizational IT security will be dealt with. According to research on the subject, IT security auditing constitutes a significant step in the safeguarding of corporate data against cybercrime, data breaches, and fraud. It must be performed from time to time in the form of a methodical analysis by an outside specialist on compliance, for identifying any chinks in the armor of the company's information technology system.
Introduction
ICT advancements have meant the availability of vast quantities of data, which also creates considerable risks to the data itself, computer systems, and critical infrastructures and operations it supports. Despite developments in information security, numerous information systems…...

Essay
Ethics Cybersecurity Awareness
Pages: 10 Words: 2891

Introduction The case of publicly traded company TechFite reveals a substantial number of ethically questionable activities being committed by the company’s Applications Divisions. Not only are their accusations of theft of proprietary information but also evidence of conflicts of interest, dummy accounts used to gain escalation of privilege, and security omissions that cannot be justified. This paper will address the ethical issues for cybersecurity that relate to the case of TechFite, discuss ethically questionable behaviors and omissions of people who fostered the unethical atmosphere, and examine ways to mitigate problems and enhance security awareness at the company.
Ethical Issues for Cybersecurity
When it comes to establishing ethical guidelines in cybersecurity, the main concerns focus on protecting data. Whether it is in health care, finance, or tech, data security has to be the number one issue—and that means confidentiality, integrity and access all have to be secured, according to the Information Systems Security Association…...

mla

References

Brewer, D. F., & Nash, M. J. (1989, May). The Chinese wall security policy. In Proceedings. 1989 IEEE Symposium on Security and Privacy (pp. 206-214). IEEE.

GIAC. (2018). Code of ethics. Retrieved from

ISSA. (2018). Code of ethics. Retrieved from https://www.issa.org/page/CodeofEthics

Lord, N. (2018). Top 10 Biggest Healthcare Data Breaches of All Time. Retrieved from https://digitalguardian.com/blog/top-10-biggest-healthcare-data-breaches-all-time

Patrick, N. (2018). 9 signs your security awareness training is failing. Retrieved from https://peoplesec.org/category/security-awareness-training-and-education-sate/

Shinder, D. (2005). Ethical issues for IT security professionals. Retrieved from https://www.computerworld.com/article/2557944/ethical-issues-for-it-security-professionals.html

https://www.giac.org/about/ethics

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now