StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Project : Information Security Management - Research Paper Example

Cite this document
Summary
Instructor Institution Date Information Security Introduction Information systems have increasingly come under attack from various security threats. Some of the threats gain access through systems in conventional ways that can be prevented if adequate security measures are taken while others are very hard to control due to their ability to infiltrate in to the system unnoticed (Stephen, et al, 96)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Research Project : Information Security Management
Read Text Preview

Extract of sample "Project : Information Security Management"

Download file to see previous pages

Threats to information security often gain access to the information stored in computer systems and manipulate the data and information rendering it meaningless and useless to the owners of the information while in some cases benefiting the sources of the information security threats (Stephen, et al, 106). As technology advances with time, so does the various threats to information security. There is therefore great need to develop strong information security mechanisms to respond to the emerging threats.

This essay seeks to explain one of the most prevalent threats to information security that has been one of the main security problems since 2010. A research conducted in 2010 showed that malware infections were among the most notable security problems to computer information systems. This essay will describe the menace of malware infections and provide the various available ways of controlling it. Development of information security strategies protecting complex data and information across a wide network while also improving system performance as well as ensuring easy data retrieval when necessary is one of the most challenging tasks in network design (Halliday).

This is even made worse by the porous and complex nature of modern transactions and the increasing demand for safe and secure information storage and retrieval mechanisms. The process of securing and protecting information refers to defending data and information from unauthorized access, disclosure, modification, inspection, use or destruction. Information security includes protection of all forms of information and data including both physical and electronic forms (Stephen, et al, 160). Information security encompasses four main areas that aim at safeguarding the whole integrity of the information collected and stored for future retrieval.

These are availability of the data and information on demand, confidentiality, accountability on the part of individuals charged with the responsibility of managing the information, and data integrity (Stephen, et al, 167). A security authentication process refers to the process of determining he individuals authorized to access, retrieve, alter and use information at specified times and in a specified manner. The authentication process involves putting in place measures to determine which individuals are ratified to access the information stored.

Malware Infection One of the most common information security problems that was very prevalent in 2010 is malware infection. Malware infections refer to attacks to information systems by malicious software applications that intrude the system and alter the data and information stored in it (Barnet). There are several types of malicious software application that can intrude an information system. Some of them are very complicated to deal with once they get in to the system and can lead to complete loss of data in the system.

Some of the most common malware include rootkits and botnets (Stephen, et al, 142). Botnets can be described as a collection of programs linked via internet, which communicate with other programs so as to perform certain tasks. Botnets are usually used as malicious software programs across the internet to perform functions such as sending spam e-mails and participating in DDos attacks that can affect information systems (Stephen, et al

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Research Project : Information Security Management Paper”, n.d.)
Retrieved from https://studentshare.org/management/1492764-research-project-yt-information-security
(Research Project : Information Security Management Paper)
https://studentshare.org/management/1492764-research-project-yt-information-security.
“Research Project : Information Security Management Paper”, n.d. https://studentshare.org/management/1492764-research-project-yt-information-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Research Project : Information Security Management

Boeing is the Manufacturing of Commercial Airplane and Military Airplanes

Boeing's Organization and management of Information Systems Boeing has a strong commitment towards the long-term enhancement in its products and processes....  This research paper explores how Boeing leverages leveraged its performance through the use of strategic information architecture systems to meet its strategic enterprise objectives.... This research paper explores how Boeing leverages leveraged its performance through the use of strategic information architecture systems to meet its strategic enterprise objectives....
8 Pages (2000 words) Research Paper

Project Part 4: Challenges - Regulations, Ethics, and Security

Challenges and risk associated with projects There are various project management challenges, including security challenges that usually affect the project's construction and completion.... In addition, all databases and records would need to be properly kept and updated in order to provide the leadership an easy access to and proper management of data (Nunan and Di Domenico, 2013).... Project Leadership On the project leadership, there is management system that is responsible for the coordination and handling of information and issues related to admissions, supplies, and population management....
3 Pages (750 words) Research Paper

Laboratory Information Management Systems

This is a dissertation conducted by investigating the possible practical applications of the Bell-Lapadula model in library information management systems.... hellip; The objective of this research is to ascertain the ways in which the Bell-Lapadula model can be applied to Laboratory Information management Systems.... The use of the Bell and LaPadula Model has been successful in modeling information that is relevant to security, even though this success might be responsible for the vagueness of the model about its primitives....
5 Pages (1250 words) Research Proposal

Successful Security Management

While security management progressed at varying speeds within industries different and between individual organizations a growing role for security departments within the corporate world was apparent.... In a nutshell, security is a collection of various processes and procedures put in place within an organization to ensure that the overall objectives and… The smooth running of the organization's processes has a strong impact on the amount of revenue generated through the sales of the products and services produced through the service (Gill, 2006)....
9 Pages (2250 words) Research Paper

Information Technology- Security

International Conference on information security and Assurance (ICISA) , & Park, J.... Advances in information security and its application: Third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009: proceedings.... Facility management and it role in the protection of organization against threatsThe international Facility management association defines facility management as a profession encompassing multiple disciplines that enhances the functionality of the built environment....
2 Pages (500 words) Research Paper

TWeb-Based Enterprise Applications Security Guidelines

Earlier, when the web based applications were developed, the information security strategies were fairly simple to impose, nevertheless, modern enterprises are grappling with numerous security threats.... The paper "Web-Based Enterprise Applications security Guidelines" discusses that proper approaches that can provide comprehensive protection from security breaches comprising intrusion detection and control of information access are required for developing secure web-based enterprise applications....
7 Pages (1750 words) Research Paper

Information Security Management

In addition, the investigation showed that when the attackers entered into their network, the Target's security team was able to determine only some of their actions.... However, the security team carefully evaluated their actions and responded accordingly.... Though, Target uses a very useful tool known as FireEye that repeatedly removes malicious code or software, however the Target's security team had turned it off before this attack (KrebsonSecurity)....
4 Pages (1000 words) Research Paper

Organizational and Technical Issues in the Management of Information Systems

Other issues include stakeholder involvement, information security, and the development of organizational competencies.... This paper, Organizational and Technical Issues in the management of Information Systems, stresses that IS help organizations become competitive.... This includes consideration of stakeholder views, prudent management practices, collaboration, and communication.... The approach for the development and management of IS should be comprehensive....
14 Pages (3500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us