How to achieve business information security in cyberspace

Assignment Help Custom Essay
Reference no: EM131528128

Write a paper using the information in the attached pdf files.

How to Achieve Business Information Security in Cyberspace?

Introduction to Information Security

As of January 2008, the internet connected an estimated 541.7 million computers in more than 250 countries on every continent, even Antarctica (Source: Internet Software Consortium's Internet Domain Survey; www.isc.org/index.pl). The internet is not a single network, but a worldwide collection of loosely connected networks that are accessible by individual computer hosts, in a variety of ways, to anyone with a computer and a network connection. Thus, individuals and organizations can reach any point on the internet without regard to national or geographic boundaries or time of day.

However, along with the convenience and easy access to information come risks. Among them are the risks that valuable information will be lost, stolen, changed, or misused. If information is recorded electronically and is available on networked computers, it is more vulnerable than if the same information is printed on paper and locked in a file cabinet. Intruders do not need to enter an office or home; they may not even be in the same country. They can steal or tamper with information without touching a piece of paper or a photocopier. They can also create new electronic files, run their own programs, and hide evidence of their unauthorized activity.

Basic Security Concepts

Three basic security concepts important to information on the internet are confidentiality, integrity, and availability. Concepts relating to the people who use that information are authentication, authorization, and nonrepudiation.

When information is read or copied by someone not authorized to do so, the result is known as loss of confidentiality. For some types of information, confidentiality is a very important attribute. Examples include research data, medical and insurance records, new product specifications, and corporate investment strategies. In some locations, there may be a legal obligation to protect the privacy of individuals. This is particularly true for banks and loan companies; debt collectors; businesses that extend credit to their customers or issue credit cards; hospitals, doctors' offices, and medical testing laboratories; individuals or agencies that offer services such as psychological counseling or drug treatment; and agencies that collect taxes.

Information can be corrupted when it is available on an insecure network. When information is modified in unexpected ways, the result is known as loss of integrity. This means that unauthorized changes are made to information, whether by human error or intentional tampering. Integrity is particularly important for critical safety and financial data used for activities such as electronic funds transfers, air traffic control, and financial accounting.

Information can be erased or become inaccessible, resulting in loss of availability. This means that people who are authorized to get information cannot get what they need.

Availability is often the most important attribute in service-oriented businesses that depend on information (for example, airline schedules and online inventory systems).

Availability of the network itself is important to anyone whose business or education relies on a network connection. When users cannot access the network or specific services provided on the network, they experience a denial of service.

To make information available to those who need it and who can be trusted with it, organizations use authentication and authorization. Authentication is proving that a user is the person he or she claims to be. That proof may involve something the user knows (such as a password), something the user has (such as a "smartcard"), or something about the user that proves the person's identity (such as a fingerprint). Authorization is the act of determining whether a particular user (or computer system) has the right to carry out a certain activity, such as reading a file or running a program.

Authentication and authorization go hand in hand. Users must be authenticated before carrying out the activity they are authorized to perform. Security is strong when the means of authentication cannot later be refuted-the user cannot later deny that he or she performed the activity. This is known as nonrepudiation.

These concepts of information security also apply to the term information security; that is, internet users want to be assured that
- they can trust the information they use
- the information they are responsible for will be shared only in the manner that they expect
- the information will be available when they need it
- the systems they use will process information in a timely and trustworthy manner In addition, information assurance extends to systems of all kinds, including large-scale
distributed systems, control systems, and embedded systems, and it encompasses systems with hardware, software, and human components. The technologies of information assurance address system intrusions and compromises to information.

What Can Happen
It is remarkably easy to gain unauthorized access to information in an insecure networked environment, and it is hard to catch the intruders. Even if users have nothing stored on their computer that they consider important, that computer can be a "weak link," allowing unauthorized access to the organization's systems and information.

Seemingly innocuous information can expose a computer system to compromise. Information that intruders find useful includes which hardware and software are being used, system configuration, type of network connections, phone numbers, and access and authentication procedures. Security-related information can enable unauthorized individuals to access important files and programs, thus compromising the security of the system. Examples of important information are passwords, access control files and keys, personnel information, and encryption algorithms.

No one on the internet is immune. Those affected include banks and financial companies, insurance companies, brokerage houses, consultants, government contractors, government agencies, hospitals and medical laboratories, network service providers, utility companies, the textile business, universities, and wholesale and retail trades.

The consequences of a break-in cover a broad range of possibilities: a minor loss of time in recovering from the problem, a decrease in productivity, a significant loss of money or staff-hours, a devastating loss of credibility or market opportunity, a business no longer able to compete, legal liability, and the loss of life. Individuals may find that their credit card, medical, and other private information has been compromised. Identity theft can affect anyone.

Individuals who want to know more should read US-CERT Cyber Security Tips and other US-CERT papers. The US-CERT website contains papers, alerts, and other information for technical readers and for those responsible for government and control systems.

Verified Expert

There are login details that are going to have to be used by the person seeking to access information or files that are associated with that particular business house or business enterprise. The password that is created in such instances is quite complicated and difficult to often remember but it is intentionally made to read as complicated so that hackers cannot figure out the password too easily.

Reference no: EM131528128

Questions Cloud

Explain which business organizational form would be best : Explain which business organizational form would be best given the above circumstances, and why? Cite a minimum of two peer-reviewed references.
Technology is a major factor in our lives : Technology is a major factor in our lives, helping us to communicate with others around the world, providing new opportunities.
Prepare general journal entries to record the transactions : At the beginning of April, Brooke Gable launched a custom computer solutions company called Softways. The company had the following transactions during April.
Has technology also affected the ethics of purchasing : Discuss how technology has impacted the legal aspects of the purchasing process. Has technology also affected the ethics of purchasing?
How to achieve business information security in cyberspace : The US-CERT website contains papers, alerts, and other information for technical readers and for those responsible for government and control systems
Transactions for the day on the computer : A clerk entered the wrong account number for a customer while entering the sales transactions for the day on the computer.
The description of creation began with a statement : The description of creation began with a statement or warning that "There is the original book and ancient writing, but the one who reads and accesses.
Explain different phases that a drug company goes through : Explain the different phases that a drug company goes through in order to bring a new drug product to market in the U.S. and Europe.
Understanding of key business processes : Two-page action plan, discussing how you would obtain an understanding of key business processes of a company that hires you to provide financial services.

Reviews

len1528128

6/12/2017 6:56:41 AM

I would like a paper written answering the question: How to Achieve Business Information Security in Cyberspace? using the information in the attached pdf files - Individuals who want to know more should read US-CERT Cyber Security Tips and other US-CERT papers. The US-CERT website contains papers, alerts, and other information for technical readers and for those responsible for government and control systems.

Write a Review

Custom Essay Questions & Answers

  Women and gender assignment

Women and gender assignment: Choose two topics to write on: It s hould be in first person's voice. Maximum of 1200 words or 5 pages. Complete reference list and in text citation.

  Empires as complex systems

Guidelines for the discussion paper topic: Empires as Complex Systems.

  How did you arrive at your assessment

Is this e-publication as reliable, less reliable, or more reliable than print sources?  Explain. How do you assess the quality of the argument presnted by the author?  How did you arrive at your assessment?

  Major barbara by bernard shaw

Topic:  Major Barbara by Bernard Shaw,  Total Word Count: 750-1000 words . Referencing has to be in MLA format. Double spaced.

  Discussions

Discussions: For each discussion mentioned in the attachment, write one page. The response discussed three ways that changes in technology contributed to the globalization of markets and production and how technology is creating global opportunity.

  IMPACT OF MOBILE PHONE

The purpose of this assignment is to develop the learners' ability to organize information and write a good report.

  Essay assignment: literary analysis with research

Essay Assignment: Literary Analysis with Research,  Your paper must demonstrate a clear thesis, unified paragraphs, and topic sentences that both describe and direct the paragraphs they head.

  Competition in the uk enterprise mobile management market

Paper on What are the strengths and weaknesses of existing competition in the UK enterprise mobile management (EMM) market(s).

  No gain without pain - sustainable entrepreneurship

Advanced Topics in TIM: Sustainable Entrepreneurship

  Remote sensing specialist for mapping environmental problems

Remote sensing specialist for mapping environmental problems

  Women and gender studies

Write an essay on  Women and gender studies.

  Effects of changes in technology

Write a article about Effects of changes in technology.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd