Free Essay SamplesAbout UsContact Us Order Now

Information Security

0 / 5. 0

Words: 275

Pages: 1

28

Information Security
Name
Institution Affiliation
Date

Shadow IT
Information Technology serves a critical role in the productivity of an organization. However, the increase in the demand for technology raises security concerns that may interfere with the information security. Shadow IT should not be encouraged because it enhances the presence of the security threats. Additionally, shadow IT prompts data redundancy hence affecting the storage capacity due to data or software duplication.
An organization can reduce the risk of the shadow IT by gathering the user requirements that enhance productivity. Creation of policies such as the cybersecurity policies can help curb the challenges of the network threats that may arise as a result of the shadow IT (Kadam, 2007). However, an organization should put in place an incidence and disaster recovery mechanism as a result of the increasing demand for technology.
Data Governance
Organization’s data is a critical asset for the decision making aspect for a competitive advantage. The data storage may be affected due to the expansion of the structure thus requiring large data repositories. Provision of data backups is a crucial aspect to consider while collecting the organization’s data. However, the issue of firewalls and presence of the intrusion detectors can help to address the network risks that may affect data integrity as well as its availability. The system users should be involved during the data collection session. Ethical conducts are essential for data collection.

Wait! Information Security paper is just an example!

Data confidentiality is a salient moral concern while accessing the data.
Cyberattack and Its Effects
Cyberattack affect the security of the information systems. Data fraud is a cyber-attack that affects data integrity and availability. The attack causes data loss which may be used for financial gain by the malicious attacker. The threat can occur due to the presence of malicious applications in a network that aims at interfering with the organization’s data. Implementation of cybersecurity policy and the presence of the backups can help prevent the risks of the cyberattacks (Bendovschi, 2015).
The attacks affect the organization’s reputation due to the violation of the client’s data security. User training regarding the threats such as data fraud and social engineering can help curb the occurrence of the security threats. Security controls such as password should not be in the cloud due to the interference from the cybercriminals.
In summation, system security has proved to be imperative to enhance business continuity and productivity. Installation of the intrusion detection systems, as well as the firewalls, can serve a critical role in the information safety. However, an organization should implement a cybersecurity policy outlining the measure to be taken for the malicious attackers.
References
Bendovschi, A. (2015). Cyber-Attacks – Trends, Patterns and Security
Countermeasures. Procedia Economics And Finance, 28, 24-31. http://dx.doi.org/10.1016/s2212-5671(15)01077-1
Kadam, A. (2007). Information Security Policy Development and Implementation. Information
Systems Security, 16(5), 246-256. http://dx.doi.org/10.1080/10658980701744861

Get quality help now

Aniya Weaver

5,0 (441 reviews)

Recent reviews about this Writer

First of all, I want to say that these guys have pretty affordable prices. I asked them to write a compare-and-contrast essay and was really impressed with the final cost and, what is even more important, the level of quality.

View profile

Related Essays

Cyberattack Brief

Pages: 1

(275 words)

Expansion

Pages: 1

(275 words)

BlackfishReading Response

Pages: 1

(275 words)

Rhetorical Analysis

Pages: 1

(275 words)

Might Have Been an Inside Job

Pages: 1

(275 words)

Breach Operation Aurora

Pages: 1

(275 words)

transactional crime(s)

Pages: 1

(275 words)

Patriot Act

Pages: 1

(275 words)