The Definitions And Concepts Of Information Security

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Abstract: Information security refers to how the information that user supply will be protected, give user information to someone else? Will sell it? Will keep it private and not give it to anyone? Will give others only part of user information. This paper has specifically focused on the information security in organization such as current issues, challengers, and recommendations to avoid problems in security of information. Now information security in organization also less concentrate because the people don’t think about effect in future if the staff not cares about information in organization. So this paper reviews about important of information security in organization.

Keywords: Information security, information in organization, issues information security

INTRODUCTION

Nowadays, information security is a big issue among people, especially information security in computer technology. Information security that’s means is the practice of maintain information from unauthorized access, use, disclosure, disruption, edit, perusal, inspection, recording or destruction. It is the words can be used another way of the form the data may take which is electronic or physical. Other than that, another terms relates with information security is information technology security. Information technology security actually information security when use to technology basically computer systems.

Security can divided in several layers which is physical layers that have to protect of physical items, objects or areas of an organization from unauthorized access and misuse. The second layers are personal security. It means to protect individual or group of individual who are authorized to access the system in organization. After that is operation security. Operation security that means to protect the details of a operation or series of activity, and the last layer is communication security. It means to protect an organization communication media, technology and content of information

The problems in information security now are lack of awareness, in corporate level and in end user level. Awareness and education are very important in information security issues. The user must accept and understand the risk when they using technology and internet. The user just put or uploads the information or picture without think the effect in their future and also same with organization, sometime the organization choose their employee not suitable in the field.

The second problems in information security is complacency, when it comes to losing data, either as a result of malware of "peopleware" many companies suffer from being complacent. This ties in very strongly to my first point of education. It is important and in many cases legally or regulatorally necessary to protect the data for which company are responsible. This data can fall into more aspects Personally Identifiable Information (PII), Intellectual Property, corporate, state or nationally sensitive information, financial results, login credentials, patient or customer information, the list is almost endless. The organizations have their own corpus of data and the relevant obligation to protect that corpus from both inadvertent and malicious exposure and or misuse. Now many companies are being too complacent in this area and are only prompted into action when a breach or a near-breach has occurred.

2.0 METHODOLOGY

In completing this term paper, I used three different methods to understanding the topic which is literature review, gain knowledge and observation.

For the first methods is literature review. I used internet as a tool to find the article relate to my topic entitled information security and the three article I refer is Information security and business continuity management in interorganizational IT relationships, second article Information system security issues and decisions for small business and the third article is Knowledge management systems: Issues, challenges and benefits Information management & computer security. I review the all information from the article and combine also create the new information understanding but still relate with the topic. The all information in internet is not accurate but I should evaluate before I state in term paper. The second methods I use are gain knowledge. To complete the term paper I ask my friends about information security and they give opinion about this topic. Other than that, we also make the discussion to gain knowledge about this topic and after that we review about the discussion. The last method is observation based on the situation. From my observation I think much organization less knowledge about information security because they not involve in programmed that the agencies provide, so from this situation the security in organization is opened and the hackers will be easy to hack.

3.0 DEFINITIONS AND CONCEPTS OF INFORMATION SECURITY

Information security (InfoSec) is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used another way of the form the data may take electronic, physical, etc.

Another term of information security is it security, it is referred to as computer security, according to www. wikipedia.org, information technology security is information security when use to technology.. A computer is any device with a processor and some memory. IT security specialists are almost always found in any main enterprise or establishment due to the nature and value of the data within larger businesses. They are responsible for save all of the technology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or get control of the internal systems.

The others term is security management, according to Barlas, Queen, Randowiz, Shillam & Williams 2007 is defined as a "systematic approach to encompassing people, process and information technology systems that safeguards critical systems and information protecting them from internal and external threats.

The first concept of information security is confidential. Confidentiality means that information that must stay secret stays secret and only those persons authorized to access it may receive access and in our information age, access to information is more important than ever. Unauthorized access to confidential information may have devastating consequences, not only in national security applications, but also in commerce and industry.

The second concept is Integrity is concerned with the trustworthiness, origin, completeness, and correctness of information as well as the prevention of improper or unauthorized modification of information. Integrity in the information security context refers not only to integrity of information itself but also to the origin integrity. Integrity protection mechanisms can divided in two categories which is , preventive mechanisms, such as access controls that prevent unauthorized modification of information, and detective mechanisms, which are intended to detect unauthorized modifications when preventive mechanisms have failed. Controls that protect integrity include principles of least privilege, separation, and rotation of duties.

Next concept is Identification is the first step in the identify-authenticate-authorize sequence that is performed every day countless times by humans and computers alike when access to information or information processing resources are required. While particulars of identification systems differ depending on who or what is being identified, some intrinsic properties of identification apply regardless of these particulars—just three of these properties are the scope, locality, and uniqueness of IDs.

After that Authentication, that means which happens just after identification and before authorization, verifies the authenticity of the identity declared at the identification stage. In other words, it is at the authentication stage that you prove that you are indeed the person or the system you claim to be.

The lastly is accountability. That means refers to a systems capability to identify that particular individual and to find and track the action and behaviour of a single individual within systems. If the individual have a accountability the information will be safe and secure because they feel responsible about the information and only authorized person can be access.

4.0 INFORMATION SECURITY CONCEPTUAL THEORY

Identification

Integrity

Authentication

Accountability

Confidential

INFORMATION SECURITY CONCEPT

Diagrams 1: Information Security Concept

Identify

Policy and Standard

Monitor Assess

Protect

Diagram 2: Security Life Cycle

5.0 CHALLENGES IN INFORMATION SECURITY

There are several challengers in information security identified is combining corporate and personal life, IT does not own and control all devices, internal vs. external vague, challengers is secret attack and government legislation and industry regulations.

5.1 Combining corporate and personal life

It is more difficult to distinguish between work life and personal life as the days have less of a different start and end. For example, employees use company email for some personal communications, and some workers may remove blackberry or mobile phones they use for limited personal use. Many people may not have a computer at home and use their company manufactures laptops for everything including conducting personal software, such as their tax software. On the flip side, some employees may bring a personal laptop to the office and try to plug it in. Inconsistent enforcement policies, many organizations are either not enforced their policies in the past, or have done so inconsistent depending on the position of the employee. This causes a lot of issues when trying to disable security functions offenders

5.2 IT does not own and control all devices

IT does not own and control all devices referred to this issue on a personal mobile device, but what if the organization does not provide the PDA to the sales team, so they buy their own and start a list of customers keep on top of it and try to connect to your wireless network at the office.

5.3 Internal versus external vague

Advantage or perimeter network is not so clear anymore. In the past we create a strong perimeter controls to control access into and out of the network, but now that the perimeter has been pushed out to their friends with extranets, to a third party hosting service, and the employees home with a VPN solution that can use of personal computers.

5.4 Secret attack

Secret attack is no longer clear. It used to be common for a viral infection to be big and messy cause a lot of damage and immediately becomes apparent when you have been infected. Now however, are silent attackers and quietly. They do not want to delete user data or take down user system, they want to slowly steal data or use user computer's power to attack other victims. They are doing their best to be undetectable by the rootkit and backdoor Trojans.

5.5 Government legislation and industry regulations.

New information security incidents and increased reliance upon the internet have encouraged governments around the world to create additional legislation to regulate the technology ecosystem. This legislation spans broad areas, like consumer privacy, to specific regulations for industries, like health care and financial services because the internet is easily accessible at more places, it is important to understand and operate in compliance with these regulations

6.0 RECOMMENDATIONS TO ADDRESS THE CHALLENGES IN INFORMATION SECURITY

In response to these challenges, the main recommendations are proposed as follows which is administrative, logical and physical control and the others recommendation is make sure the CEO know the information security management and Separate organization computing environment into zones.

6.1 Administrative control.

Administrative controls also called procedural controls incleded of approved written policies, procedures, standards and guidelines. Administrative control explain about how the email in organization and how day to day operations are to be conducted. One of the administrative control is Laws and regulations created by government bodies because they inform the rules. Some industry sectors have policies, procedures, standards and guidelines that must be followed. Other examples of administrative controls include the corporate security policy, password policy, hiring policies, and disciplinary policies.

6.2 Logical control.

Logical controls also called technical controls, use software and data to managed and control access to information and computing systems. The organization control through passwords, network and host based firewalls network intrusion detection systems, access control lists, and data encryption are logical controls. The benefits of logical control that is frequently overlooked is the principle of least privilege. The principle of least privilege requires that an individual, program or system process is not granted any more access privileges than are necessary to perform the task. This happens when the staff transfer to another department or change to higher level.

6.3 Physical control.

Physical controls managed and control the environment of the work place and computing facilities. They also managed and control access to and from such facilities. For example doors, locks, heating and air conditioning, smoke and fire alarms, fire suppression systems, cameras, barricades, fencing, security guards, cable locks and so on. Separating the network and workplace into functional areas are also physical controls. An important physical control that is frequently overlooked is the separation of duties. Separation of duties ensures that an individual can not complete a critical task by himself. For example an employee who submits a request for reimbursement should not also be able to authorize payment or print the check. An applications programmer should not also be the server administrator or the database administrator. These roles and responsibilities must be separated from one another

6.4 Make sure the CEO know the information security management.

The CEO must detail know about information security management to avoid if something wrong happen in organization. If the CEO don’t know the organization will be destroy and cannot develop. The objective of the Information Security Management is to ensure that IT security is consistent with business security, ensuring that information security is effectively managed in all service and Service Management activities and that information resources have effective stewardship and are properly used. This includes the identification and management of information security risks

6.5 Separate organization computing environment into "zones."

Security zones offer easy and flexible method for managing a secure environment. Organization can use security zones to enforce organization's Internet security policies, based on the origin of the Web content. Security zones enable organization to group sets of sites together and assign a security level to each zone. Grouping Sets of Sites Together that means Zone security is a system that enables organization or user to divide online content into categories, or zones. Organization can assign specific Web sites to each zone, depending on how much you trust the content of each site

7.0 CONCLUSION

As a conclusion information security actually is very important in organization because to protect data from user or customer. So if information safe in organization it is one of the investments from customer, they confident with organization because the all data will be protected from that organization. So all of the organization must be find the new alternative to protect information for develop their business. Other than that the staff in organization also must follow the guidelines provide from organization and also involved in security programmed. After that the government also must promote to people about important of information security and also give the fund to implement the all programmed. So if the country implement that guide truly, the information will be safe.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now