Submitted by: Submitted by skipunk
Views: 629
Words: 3470
Pages: 14
Category: Business and Industry
Date Submitted: 09/07/2011 03:27 PM
Abstract
When we think about security we think about doors, bars on windows, guards, alarms and so forth. When we look at information security we think about passwords and permissions. In the past that is all we needed to protect our information. As technology continues to advance, security takes on a whole new roll. We are no longer storing papers in boxes behind a locked door. We are now securing servers and large datacenters with vast amounts of information.
Introduction
When we think about security we think about doors, bars on windows, guards, alarms and so forth. When we look at information security we think about passwords and permissions. In the past that is all we needed to protect our information. As technology continues to advance, security takes on a whole new roll. We are no longer storing papers in boxes behind a locked door. We are now securing servers and large datacenters with vast amounts of information.
Protecting this data has given security a whole new meaning. Today we are protecting from spyware, viruses, hackers and even our own employees. Information security is necessary for businesses that want to survey and keep valuable data away from unauthorized users. Many businesses have some type of information security in place, but is it really enough? The articles review below will explain why information security is important and ramifications if information security is not implemented.
Information Security Governance
The need for information security is necessary for all businesses. Proper planning and implementation is the key to safeguarding data. A recent study has shown that malicious attacks were caused by viruses with employee abuse following a close second. Although most businesses do have some type of information security measures in place, the protection tends to be ineffective with staff taking a reactive approach over a proactive approach. The article by Allen Johnston and Ron Hale examine the planning for information...