StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The Development Information Security - Essay Example

Cite this document
Summary
This essay describes increasing trend of digitized information, globalization of markets and resources has accelerated the incident of data loss and security issues. Consequently, this ever-increasing security threat has led to the development of numerous information security standards…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
The Development Information Security
Read Text Preview

Extract of sample "The Development Information Security"

Download file to see previous pages

There are many well-known security standards available, for instance, ISO, NIST, and COBAT. However, most of the Security Frameworks stress more on compliance requirements and controls rather than effectiveness. Standards, procedures and practices provided to larger organization easily swamp the SMEs. Due to lack of resources, SMEs often spend minimum amount on security and scarcely utilize their resources to apply hundreds of good practices provided by security standards and frameworks. Furthermore, SMEs do not adapt to all the ISO security standards rather they define their own strategies in order to meet their specific security goals.

It indicates the importance of providing SMEs a security framework that facilitates the task of identifying and applying security measures in accordance with their own needs and requirements. Therefore, we need to go back to square one and design a more suitable portfolio of solutions in order to cater a broader set of organizations and circumstances. There is no single industry security standard that provides all the answers. However, a good industry standard does provide a widely accepted and proven framework.

It not only defines a particular security program in order to provide a foundation for security system but also satisfies particular needs of the organization. Such framework is derived from the development of a prioritized set of objectives and practices as suggested by literature and standards provided by ISO standards. This security framework provides steps to establish best suited Information Security Management System (ISMS) for SMEs. These ISMS are based on ISO standards which enable SMEs to see the value of security outside of technical constraints and regulatory compliance.

Moreover, it helps SMEs to incorporate security practices, controls and procedures to align business requirements with IT security requirements. Moreover, it provides support for effective use of technology, central management, adaptability, flexibility, performance, interoperability and compliance on the forefront.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Development Information Security Essay Example | Topics and Well Written Essays - 6250 words”, n.d.)
The Development Information Security Essay Example | Topics and Well Written Essays - 6250 words. Retrieved from https://studentshare.org/information-technology/1568348-get-me-someone-to-improve-the-writing-style-of-one-of-the-chapters-i-wrote-the-writer-should-be-native-english-speaker-the-writer-should-be-a-tec
(The Development Information Security Essay Example | Topics and Well Written Essays - 6250 Words)
The Development Information Security Essay Example | Topics and Well Written Essays - 6250 Words. https://studentshare.org/information-technology/1568348-get-me-someone-to-improve-the-writing-style-of-one-of-the-chapters-i-wrote-the-writer-should-be-native-english-speaker-the-writer-should-be-a-tec.
“The Development Information Security Essay Example | Topics and Well Written Essays - 6250 Words”, n.d. https://studentshare.org/information-technology/1568348-get-me-someone-to-improve-the-writing-style-of-one-of-the-chapters-i-wrote-the-writer-should-be-native-english-speaker-the-writer-should-be-a-tec.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Development Information Security

Policies and Procedures Organizations Should Implement to Protect Themselves

Professional ethics plays crucial role in helping information security professional to execute their duty.... However, to ensure maximum information security, organizations need to institute relevant legislations to guard against information security breach.... Protecting the firm from possible information security breach should be a major focus of the company's operational process.... Recommended information security Policies for Organizations Control over Access to Computer Rooms In order to ensure high level security for crucial organizational information, computer rooms should be kept under lock and key at all times....
4 Pages (1000 words) Essay

The US Department of Veterans Affairs

information security Program Survey: US Department of Veterans Affairs (VA) Executive summary The United States Department of Veterans Affairs (VA) is government powered departmental system for providing services for the wellbeing of military veterans, their families, and survivors.... Recently, the VA has implemented the Continuous Readiness in information security Program (CRISP) to enhance the privacy of information about Veterans and their families.... This information security program greatly fits the VA's FY 2010-2014 strategic plan because this program notably contributes to value optimization and stakeholder satisfaction....
4 Pages (1000 words) Essay

Securing and Protecting Information

Security and Protecting Information Instructor Institution Date Securing and protecting information Development of information security strategies protecting complex data and information across a wide network while also improving system performance as well as ensuring easy data retrieval when necessary is one of the most challenging tasks in network design (Dhillon, 2007).... information security includes protection of all forms of information and data including both physical and electronic forms....
3 Pages (750 words) Essay

Information security risk assessment and mitigation strategies development

This research “information security risk assessment and mitigation strategies development” is focused on considering strategic steps of security management taken in case potential information hazards may occur.... hellip; The research question is the following: “How is it possible for any organization to improve and apply effective information security risk assessment and mitigation strategies”.... It brings in an innovative vision about the role of information security....
5 Pages (1250 words) Thesis Proposal

Information Security Policy: Development Guide for Large and Small Companies

A paper "information security Policy: Development Guide for Large and Small Companies" outlines that the government and organizations should establish appropriate policies.... hellip; information security laws and practices involve the ways of ensuring that organizations protect and manage their information, that is in order to prevent it from getting lost or being distorted for the purpose of achieving laid goals.... information security Policy: Development Guide for Large and Small CompaniesInformation security laws and practices involve the ways of ensuring that organizations protect and manages their information, that is, in a confidential and safe manner, in order to prevent it from getting lost or being distorted for the purpose of achieving laid goals....
2 Pages (500 words) Case Study

Information Systems Security Survey

As a result… IRS has an information security risk management program that is mainly constructed to balance the company's security duties alongside other business duties.... According to previous reports of IRS the recurring cases of information security weakness puts it at a risk of fraud, disruption or inappropriate disclosure of sensitive information.... As a result, the Federal information security Management Act (FISMA) states that every agency should form, record and implement a security program for the whole information system that seeks to promote the organizational assets with minimum risks (Grance, 2003)....
3 Pages (750 words) Essay

The Role of the Information Security Officer

In the paper “The Role of the information security Officer” the author looks at the field of information security, which deals with the security of information against threats like illegal access, leakage of confidential information, interference between flows of information between organizations.... Impact of information security ThreatsAccording to (Williams, 2007; Pesante, 2008; Turban et al.... 2005), there are some information security risks those can be faced by the users such as • They must be able to trust on the information which they are using....
12 Pages (3000 words) Dissertation

The History of Information Security

The following paper under the title 'The History of information security' gives detailed information about security that has developed to become a crucial need for all information operations due to the rapid rise of information hackers and attackers.... hellip; The history of information security stretches back to ancient periods, and it began with the creation of a bureaucracy in the administration competition.... The traditional information security techniques that were used in ancient Egypt such as data hiding, watermarking, and cryptography, are some of the basic notions, and they do play a significant role in the development of the information security sector algorithms and solutions....
5 Pages (1250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us