Information Security

Submitted by: Submitted by

Views: 629

Words: 3470

Pages: 14

Category: Business and Industry

Date Submitted: 09/07/2011 03:27 PM

Report This Essay

Abstract

When we think about security we think about doors, bars on windows, guards, alarms and so forth. When we look at information security we think about passwords and permissions. In the past that is all we needed to protect our information. As technology continues to advance, security takes on a whole new roll. We are no longer storing papers in boxes behind a locked door. We are now securing servers and large datacenters with vast amounts of information.  

Introduction

When we think about security we think about doors, bars on windows, guards, alarms and so forth. When we look at information security we think about passwords and permissions. In the past that is all we needed to protect our information. As technology continues to advance, security takes on a whole new roll. We are no longer storing papers in boxes behind a locked door. We are now securing servers and large datacenters with vast amounts of information.

Protecting this data has given security a whole new meaning. Today we are protecting from spyware, viruses, hackers and even our own employees. Information security is necessary for businesses that want to survey and keep valuable data away from unauthorized users. Many businesses have some type of information security in place, but is it really enough? The articles review below will explain why information security is important and ramifications if information security is not implemented.

Information Security Governance

The need for information security is necessary for all businesses. Proper planning and implementation is the key to safeguarding data. A recent study has shown that malicious attacks were caused by viruses with employee abuse following a close second. Although most businesses do have some type of information security measures in place, the protection tends to be ineffective with staff taking a reactive approach over a proactive approach. The article by Allen Johnston and Ron Hale examine the planning for information...