Information Systems Risks

Submitted by: Submitted by

Views: 408

Words: 2121

Pages: 9

Category: Other Topics

Date Submitted: 03/21/2013 08:18 AM

Report This Essay

Information Systems and the risks they impose


Information Systems Security

SECR 2020

December 6, 2008


This Research Paper will identify 6 components of an Information Systems, data, people, software, hardware, network and procedures and the risks they impose. We must accept the fact that our Information Systems are vulnerable and that we must protect the data that is on it. This is done by restricting access to the data and ensuring the organizational policies and procedures are current along with training and awareness for employees.

Information Systems and the risks they impose

The history of Information Security goes way back and begins with computer security. According to E. Whitman and H. Mattord. The need for computer security—that is the need to secure physical locations, hardware and software from outside threats—arose during World War II when the first mainframes, developed the aid computation for communication code breaking, were put to use. Multiples levels of security were implemented to protect these mainframes and secure data integrity. Access to sensitive military locations, for example, was controlled through the use of badges, keys and the facial recognition of authorized personnel by security guards. The growing need to maintain national security eventually led to more complex and more technologically sophisticated computer security safeguards.

We begin with the first information system security components data. According to data is defined as individual facts, statistics, or items of information. Every organization or business has data. Without data they would have no need to exist. Data is all around us and comes in many forms. Some data is free to look at some data requires special access in order to see it. There is not a business or organization existing that does not have data. Whitman and Mattord states that data is often the most valuable asset possessed by an organization...