Preview

ISM Workshop

Better Essays
Open Document
Open Document
1008 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ISM Workshop
ICT 357 / 557
Information Security Management

Assignment - Workshop 1

Question 1
Describe the main differences between Computer Security and Information Security. Define and describe key elements in Information Security.

Computer security refers to the methods and practises that are employed by employees to protect private resources in a computer system from being accessed, modified or deleted (Gollmann 2010). Many industries implement strict computer security measures. This may include installing physical locks on doors, security cameras, security guards, and emergency protocols in the occurrence of a flood or fire. Firewalls, varying levels of access privileges, and data encryption prevent the interference of data that is stored or accessed on a computer. The United States’ Computer Security Act of 1987 requires federal departments to provide training to employees to teach knowledge workers these skills, as the emergence of communications devices and technologies has made most industries vulnerable (Whitman 2010, 194). Schell discusses how a lack of computer security in US Government programs has led to the exposure of sensitive military communications and strategies (2013). This is in contrast to Information security, which encompasses computer security in addition to physical, operations, communications and network security in an information system (Whitman 2010, 4). The CNSS security model provides a framework of desirable attributes of a secure information system, which includes confidentiality, integrity and availability (Whitman 2010, 4).

According to Parker (1998) some key element of information security:
Confidentiality: Measure the information is belonging to a authorised people, and they are the only one who able to get access.
Integrity: Measure the quality of the information (not been modified from the previous state)
Availability: Measure that the information is accessible on anytime.
Possession: The



References: Gollmann, D. "Computer security." WIREs Comp Stat, 2010. McKenzie, I. Australian Government. August 2011. http://www.dsd.gov.au/publications/Information_Security_Manual_2010.pdf (accessed August 07, 2013). Parker, D. Fighting computer crime: A new framework for protecting information. New York: Wiley, 1998. Whitman, Michael E., and Herbert J. Mattord. Management of information security. CengageBrain. com, 2010. Schell, Roger, R. “Computer Security.” Air and Space Power Journal 27 (1): U.S. Trade journals, 2013 Group Members

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    8. Identify the five components of an information system. Which are most directly impacted by the study of computer security? Which are most commonly associated with its…

    • 764 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

     User names and passwords  Patents and copyrights  Source code  Diplomatic information  Financial data NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3) Suppose your business had an e-commerce Web site where it sold goods and accepted credit card payments. Discuss the major security threats to this Web site and their potential impact. What can be done to minimize these threats?…

    • 280 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    9/11 and Airport Security

    • 3569 Words
    • 15 Pages

    McClure, George. "IEEE-USA Today 's Engineer." 02.12 Ieee-usa Today 's Engineer. 2007. Web. 21 Feb. 2012. http://www.todaysengineer.org/2005/Jun/security.asp…

    • 3569 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    Cyber security must be an aggressive and evolving practice. Not only is it important to put security in place for current technology that can access electronic information, but also to look forward to future trends and strategies. Methods must also be developed that will continuously protect information regardless of growth and technological advances. As trends change and new technology develops it is the responsibility of businesses to balance cost saving measures with adequate security measures.…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Many cases of data and identity thefts only show the vulnerability of Americans in terms of the protection of their personal data. With the purpose of addressing these challenges, St. Louis County is responsible to play a part in protecting the country by the enforcement of a cyber-crime unit that is able to assist government institutions, businesses, and citizens to fight against cyber terrorism. The thought is that this will develop into a larger defense strategy which can be linked with other agencies like local law enforcements agencies, police departments, DHS, CIA, ATB, ICE, and FBI. The three most risky cybercrimes affecting citizens in the St. Louis County are known to be sexual solicitation, identity theft, and cyber-attacks affecting individual computers or the networks. In order to protect the county from these crimes the police commissioner has been me to put together and build a special cyber-crime task…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Information Security Policy

    • 3396 Words
    • 14 Pages

    References: Merkow, Mark & Breithaupt, Jim. (2006). Information Security: Principles and Practices. Published by Prentice Hall. Retrieved August 19, 2011…

    • 3396 Words
    • 14 Pages
    Best Essays