Monday, April 22, 2019

Information Security Research Paper Example | Topics and Well Written Essays - 750 words - 1

Information Security - Research Paper ExampleWith the increase in the workout of distributed computing, mobile computing and the fast growth in the adoption of internet for business communication, there is an increase need for information security. The adoption of these technologies exposes businesses to information theft and fraud through with(predicate) various attacks much(prenominal) as phishing, DoS and virus attacks.Without security for information, a business organization stands a chance of catastrophic disruptions through downmagazine in business critical systems. In the event of restoring such systems a business organization incurs unnecessary and unwanted costs. (Gordon & Loeb, 2002)Violation of covert business needs to be able to protect both guest and employee information, failure to which can result into legal actions and penalties. Financial loss theft of commercial information such as business plans, intellectual property or customer contracts can financially dam age a business organization. Immediate financial impacts can be felt by a business in case of a computer fraud by a staff member. The penalties and fines associated with failure to protect privacy of information about its customers including its staff severely damage the reputation and credibility of the business.Information security principally stresses on the preservation of three factors associated with information confidentially, availability and integrity among others like authorization, authentication and non repudiation. Confidentiality is information privateness preservation that is ensuring that such information as financial projections, technical designs and business reports are only vied by authorized personnel. Integrity ensures that information has not been manipulated or tampered with it ensures that information can be relied upon to be entire to its purpose. The availability aspect of information security ensures that information is accessible to the authorized per sons at the required time

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.