Preview

Critically Evaluate the Importance of Information Security

Best Essays
Open Document
Open Document
3482 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Critically Evaluate the Importance of Information Security
CB Hart Law Firm: An Information Security Report
November 2011

Business Information Systems
Salford Business School

TABLE OF CONTENTS:

INTRODUCTION pages number
1. MAIN CONTENT 1.1. Information security from business perspective 2-4 1.2. Value of information 4 1.3. Information security threats and risks: 4-5 1.3.1.Theft 5-6 1.3.2.Fraud 6 1.3.3.Malicious damage 6 1.3.4.Incompetence and mistakes 7 1.3.5. Accidents and disasters 7
2. MAIN BODY 2.1. Domains 7-8 2.2. Ten most common domains 8 2.2.1. Security management practices 8-10 2.2.2. Access control 10-11 2.2.3.Cryptography 11-12 2.2.3.1.Terminology 12-13
3. Conclusion 14-15
4. List of figures 16
5. References 17-18

INTRODUCTION

CB Hart has suffered major reputation problems because of disregarding the small security issues. Company has been affected by the event of data leakage. The information that leaked was not hugely confidential but that situation was damaging enough to cause a big decrease in the reputation of the CB Hart. Company requires serious changes in its security aspects. This will need to be done by reviewing the past similar situations regards data leakage. It is important that proper security of clients’ information, which is stored within CB Hart’s database, is a part of the company marketing strategy. IT department will have to review past security problems and methods of how it has been solved. They will also be required to arrange new problem solving methods that have not been previously implemented. IT team will need to research most current data which is stored on company’s servers and try to find and eliminate possible errors. New CB Hart’s management has agreed further steps and investment for marketing strategy and differentiation factor of the firm. IT department is required to provide solutions for company’s security improvement. The most



References: Stoneburner, Gary. “Computer Security”, Retrieved November 11, 2011, From National Institute of Standards and Technology at http://csrc.nist.gov/publications/nistpubs/800-27A/SP800-27-RevA.pdf Back, Adam Fenner, Audrey. “Placing Value on Information”, Retrieved November 10, 2011, From http://unllib.unl.edu/LPP/fenner.pdf Hinson, Gary (2008) Unknown author (2010). “Top 10 Information Security Threats for 2010”, Retrieved November 21, 2011 from Help Net Security at http://www.net-security.org/secworld.php?id=8709 Unknown author Unknow author (2010). “ 10 Security Domains”, Retrieved November 24, 2011 From http://orkanet.com/production/info_tech/10_security_domains.htm Dougherty, Michelle (2004) Cazemier, Jacques (1999). “Security Management” (1st Edition), Controller of Her Majesty’s Stationary Office, Norwich. ISBN: 0 11 330014 Janczewski, Lech Hawkner, Andrew (2000). “Security and Control in Information Systems”, Routledge, New York, ISBN 0-415-20534-4 Unknown Author, Retrieved November 22, 2011 From http://transit-safety.fta.dot.gov/security/SecurityInitiatives/DesignConsiderations/CD/sec5.htm

You May Also Find These Documents Helpful

  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Information security teams from the top down should be capable of working collaboratively with business units participating on strategy committees, assessing business…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

     User names and passwords  Patents and copyrights  Source code  Diplomatic information  Financial data NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 5 Types of Threats  Malicious software  Device failure  Application failure  Natural disaster  Intrusive cracker NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is 411 Study Guide

    • 305 Words
    • 2 Pages

    Information Security Business Challenges and Policies the mitigate risk within the 7 domains. – p 77 - 83…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    9/11 and Airport Security

    • 3569 Words
    • 15 Pages

    McClure, George. "IEEE-USA Today 's Engineer." 02.12 Ieee-usa Today 's Engineer. 2007. Web. 21 Feb. 2012. http://www.todaysengineer.org/2005/Jun/security.asp…

    • 3569 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    Class I worked with a community college network a few years ago and it was almost fun to watch. No matter how much bandwidth they purchased, the students would use it all. They could not get educational traffic to work because there was too much competition from students gaming and streaming audio and video. Ultimately they purchased some expensive bandwidth management equipment to give priority to certain traffic. The problem was not really security, but rather, controlling usage.…

    • 1177 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    ISP Survey

    • 1455 Words
    • 5 Pages

    References: Cichonski, P., Millar, T., Grance, T., Scarfone, K. (2012). NIST SP 800-61: Computer Security Incident Handling Guide. National Institute of Standards and Technology. Rev. 2. Retrieved from National Institute of Standards and Technology.…

    • 1455 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Better Essays

    References: Ortmeier, P.J. 2009. Introduction to Security: Operations and Management. (3rd ed). Upper Saddle River, N.J.: Pearson Prentice Hall…

    • 1495 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Whitman, M., & Mattord, H. (2010). Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.…

    • 1752 Words
    • 8 Pages
    Better Essays