AllBestEssays.com - All Best Essays, Term Papers and Book Report
Search

Information Security

Essay by   •  January 18, 2014  •  Essay  •  603 Words (3 Pages)  •  1,285 Views

Essay Preview: Information Security

Report this essay
Page 1 of 3

Information security has emerged as one of the key factors for organizations. Information security refers to the processes, methodologies that are involved with keeping information confidential and assuring its integrity. Information here is not limited to the Computer data but also accounts for the telephone conversations.

The 2013 Cost of Data Breach Study conducted for IT security provider Symantec, says that the average global cost of a data breach at $136 a record in 2012, up $6 from in 2011. The study says human errors and system problems caused about two-thirds of data breaches, and that contributed to the worldwide increase in costs.

Below are my views regarding the Basic goals of information security.

1) Steal valuable information/data in electronic form:

With the advancements in technology, Stealing valuable data or information of an individual or an organisation has become rampant. The hackers these days manage to get access to steal the valuable information like individuals medical record details, Financial and personal information of the individuals.

Eg: Recently hackers have hacked in to the Korean telecom company and got access to the individuals info and sold this information to the advertising companies.

2) Capture intellectual property illegally:

Intellectual property belongs to an company or an individual , that is meant to be protected as they might have put an lot of effort and time in to the product. Getting access to these intellectual property illegally will cost an company or an individual a huge loss.

Eg: Recently, hackers have got access to the ADOBE database and captured their Photoshop's source code.

3) Violate identity of individuals:

Identity theft has become an serious problem now a days , where the individuals identity is forged and is misused. Now a days peoples credibility go by their credit scores , when these hackers do identity theft , and use their social security for illegal means, the individual hard earned credibility , jobs etc. are lost

Eg: We see many people around us who were the victims of identity theft.

4) Impede productivity in organizations through electronic maneuvers;

There are numerous ways, by which the malicious malwares get in to the organization and drastically affect the productivity of the company. Some of these malwares get in to the company's network when an individual unknowingly installs some software's in to the company laptops or by browsing some websites. Hence I personally feel that companies should educate their employees regarding these security breaches and ways to prevent them.

Eg:

...

...

Download as:   txt (3.8 Kb)   pdf (71.4 Kb)   docx (10.3 Kb)  
Continue for 2 more pages »
Only available on AllBestEssays.com
Citation Generator

(2014, 01). Information Security. AllBestEssays.com. Retrieved 01, 2014, from https://www.allbestessays.com/essay/Information-Security/57489.html

"Information Security" AllBestEssays.com. 01 2014. 2014. 01 2014 <https://www.allbestessays.com/essay/Information-Security/57489.html>.

"Information Security." AllBestEssays.com. AllBestEssays.com, 01 2014. Web. 01 2014. <https://www.allbestessays.com/essay/Information-Security/57489.html>.

"Information Security." AllBestEssays.com. 01, 2014. Accessed 01, 2014. https://www.allbestessays.com/essay/Information-Security/57489.html.