Sign In
Not register? Register Now!
Pages:
3 pages/β‰ˆ825 words
Sources:
5 Sources
Style:
APA
Subject:
Technology
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 19.44
Topic:

Case Overview of Security Issues

Coursework Instructions:

Module 1 - Case
OVERVIEW OF SECURITY ISSUES
Assignment Overview
According to Pesante (2008) there are three basic security concepts that are important to information on the Internet. Those are: confidentiality, integrity, and availability. In addition, she indicates that there are three additional concepts relating to the people who use information which are authentication, authorization, and nonrepudiation. Please read the full article that explains these concepts.
Pesante, L. (2008). Introduction to Information Security. Retrieved from the World Wide Web on 05/20/09 from http://www(dot)us-cert(dot)gov/reading_room/infosecuritybasics.pdf
Solutions to achieve information security are multi-faceted and require collaborations from multi-parties. It is not easy to assure information security, such as in the dimensions mentioned above. The following article broadens one's views on security. Even though it focuses on the protection of infrastructure, one can learn from its methods of approaching security to solve other kind of security problems. It is a long article. You don't need to read word-by-word. Please focus on the key concepts.
White House. (2009). Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure. White House.
The following essays are much shorter and easier to read. They offer different perspectives and especially with unique views on the role of the government.
Schneier, B. (2012), The Big Idea: Bruce Schneier. February 2012.
Gonsalves, A. (2012), RSA 2012: Three Greatest (and Surprising) Internet Security Dangers, CRN.
Case Assignment
Prepare a 3- to 4-page paper addressing the question:
"How to Achieve Business Information Security in Cyperspace?"
Assignment Expectations
Use information from the modular background and case readings as well as any good quality resource you can find. Please cite all sources and provide a reference list at the end of your paper.
The following items will be assessed in particular:
Your ability to consolidate ideas from reading materials.
Your demonstration of your understanding of various dimensions of IT securities and available IT security solutions.
Your ability to apply your understanding in national security policy in cyberspace to a business or an organization.

Coursework Sample Content Preview:


Module1- Case Overview of Security Issues
Name
Institution
Module1- Case Overview of Security Issues
The Internet is a collection of millions of computers in a lightly interconnected networks that are accessible to individual computer users. This means that the internet or cyberspace offers the convenience and easy access of information. However, with this convenience also comes various security risks when dealing with virtual information. Among these risks is the danger of information being stolen, altered, or even misused. However, there are things that businesses can do to achieve information security in cyberspace (Pesante, 2008).
First, it is crucial for businesses or firms to train their employees on the risks and security principles. Employees remain the initial line of defense when there is risk of malicious activities on their work computers. The idea is to ensure that they understand basic security principles and standards such as the need for strong passwords. The firm need to establish suitable Internet user guidelines that comes with penalties when cyber security principles are violated. It is important for a firm to create rules of behavior and conduct when dealing with customer data and other vital information (Carneiro, 2014).
When it comes to passwords for all programs used in the business, there is a need to ensure proper authentication procedures before granting access. For instance, a company can consider using multi-factor authentication that asks users to provide additional information beyond inputting the password. Today, it is possible for hackers to crack passwords because of current algorithms and enhanced rainbow tables being designed. However, with multi-factor authentication, businesses can protect their networks from hackers. Further, let the passwords used be unique, strong to guess, and need to be changed regularly to put off hackers (Carneiro, 2014).
Businesses also need to take vigorous steps in protecting information, computers, and their networks from cyber crimes. The important thing is to ensure machines are clean by having the latest software updates, using trusted web browser, and protecting the operating system from threats of viruses, malware, as well as other online threats. This means having an updated antivirus that is set to perform a scan after every update. Other security measures that firms can take to ensure cyber security include securing the internet connection using things like firewalls. A firewall denotes a set of connected programs that deter outsiders from having access to a private network. If there are employees who work from home, the business need to ensure that their home computers have a firewall. It is also possible to consider a layered firewall that secures critical programs within the private network and limits traffic to only those users who are within the organization (Carneiro, 2014).
Businesses need to learn how to back up their information at all times. There is a need to make backup copies for all crucial business information and...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Coursework Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!