This website uses cookies to ensure you have the best experience. Learn more

Information Security Essay

988 words - 4 pages

Human differences
Human beings are prone to certain characteristics that tend to affect their relation to information security. Information security refers to the ability of an individual to ensure that information is free from any kind of access by unwarranted individuals. There are several human inadequacies that affect the level of information security. However, this discussion is going to concentrate on three major human characteristics that affect information security. These include: acts of omission, acts of commission and acts of sequence. These three acts are important in to information security because they are not related to distortion of information but they increase the ...view middle of the document...

The second human trait is acts of commission. Parsons (2010) indicates that there are cases whereby individuals miss out on the correct procedure of performing a particular action. There are cases whereby forget to enter their passwords in the correct forms hence creating challenges to the information system security (Parsons 2010). Performance of an action without observing the correct sequence could also affect information security. For example, there are certain procedures that one is supposed to follow when storing information. Therefore, the inability to follow these steps could make one to store information in files that are easily accessible by unwarranted individuals in an organization.
Probable solutions to the above human acts
There are two factors that are comprehensively adequate in solving the above human acts in regard to information security. These factors include usability and short cuts. Information technology involves certain complex processes that require strict adherence by users of information technology systems. The complexity of these systems makes them to be difficult for human beings to easily operate. Owing to these complexities, most users tend to develop shortcuts in order to make the usage of this technology to be easier. Through the use of shortcuts they end up making information to be vulnerable to insecurity. According to Parsons (2010), most human beings tend to reduce cognitive efforts when dealing with information technology. In a bid to ensure that usability and shortcuts do not affect the level of information security, it essential that there is an increased level of exposure to technology. Through increased usage, users will be able to discern the required procedures and action hence reducing the level of shortcuts used when dealing with information technology.
Dementia and its influence to information security
Breitner (2006) indicates that dementia is a collective term for mental related illnesses. These conditions include inadequacies on memory, thinking speed, mental agility, language, judgment and understanding (Breitner 2006). These conditions resultantly lead o situations such as memory loss, low thinking speed and inadequate words to describe situations...

Other Papers Like Information Security

Information Security Audit Essay

1093 words - 5 pages Information Security Audit Name Institution Information Security Audit When conducting information security audit may people tends to confuse it with information systems audit. Information system audit is a substantial, expansive term that envelops boundary of obligations, equipment an server administration, incidents and problem administration, safety, network division, privacy and security assurance (Pathak, 2004). Then again, as the

Principles Of Information Security Essay

3291 words - 14 pages Principles of Information Security Fourth Edition Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional

Principles of Information Security

3241 words - 13 pages Principles of Information Security Fourth Edition Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove

Information Security Modification Recommendations

1323 words - 6 pages Tft2 Task3 In: Computers and Technology Information Security Modification Recommendations Service Level Agreement Between Finman Account Management, LLC, Datanal Inc., and Minertek, Inc. After careful review of the current Service Level Agreement(SLA) “A Service Level Agreement for Provvision of Specified IT Services Between Finman Account Management, LLC, Datanal, Inc., and Minertek, Inc.” we have determined that standard Information

Information System Security

1267 words - 6 pages ) for the back-up scheduling time cycle. Solution 7: The corporate security policy is out of date and each branch office differs, so you must research and define security operations and administration including the identification of information assets and documentation of policies, standards, procedures, and guidelines that ensure confidentiality, integrity, and availability. Business Continuity Plan: Richman needs to set down and revive the

Information System Security

1538 words - 7 pages . This has been mainstreamed into Linux and ported to several other systems, including the Solaris™ operating system, the FreeBSD® operating system, and the Darwin kernel. This provides a mechanism to enforce the separation of information based on confidentiality and integrity requirements and it allows threats of tampering and bypassing of application security mechanisms to be addressed while enabling the confinement of damage that can be caused

Principles Of Information Security

307 words - 2 pages essential part of every IT organization’s ability to sustain long-term competitiveness. When an organization depends on IT-based systems to remain viable, information security and the discipline of risk management must become an integral part of the economic basis for making business decisions. These decisions are based on trade-offs between the costs of applying information systems controls and the benefits realized from the operation of secured

Hipaa and Information Security

1176 words - 5 pages Darl A. Hammacher Jr. IST 293 21 July 2013 HIPAA and Information Security In a society where you can find out nearly everything about a person by simply using the internet, there are still certain aspects of people’s lives that remain private thanks to certain federal and state laws. These laws have been enacted to not only maintain privacy of patients, but to reduce costs and fraud in the field they are related to. The continued growth of

Information Systems Security

4584 words - 19 pages Fundamentals of Information Systems Security 1E REVISED 38351_FMxx_ttlcp.indd 1 8/1/12 1:00 PM 38351_FMxx_ttlcp.indd 2 8/1/12 1:00 PM Contents Ethics and Code of Conduct Preface LAB #1 ix vii Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Introduction Deliverables Hands-On Steps 1 1 3 14 15 2 Learning Objectives 1 Evaluation Criteria and Rubrics LAB #1 ASSESSMENT WORKSHEET LAB #2 Perform a

Information Security Policy

1790 words - 8 pages . Not transmit copyrighted materials without permission. 4. Know and abide by all applicable Hano policies dealing with security and confidentiality of company records. 5. Run a virus scan on any executable file(s) received through the Internet. 6. Avoid transmission of nonpublic customer information. If it is necessary to transmit nonpublic information, employees are required to take steps reasonably intended to ensure that information is

Chapter 1-Introduction to Information Security: Principles of Information Security

979 words - 4 pages Chapter 1-Introduction to Information Security: 1. What is the difference between a threat and a threat agent? A threat is a constant danger to an asset, whereas a threat agent is the facilitator of an attack. 2. What is the difference between vulnerability and exposure? Vulnerability: is a fault within the system, such as software package flaws, unlocked doors or an unprotected system port. It leaves things open to an attack or

Related Essays

Information Security Essay

3941 words - 16 pages relationships with customers, communities, governments, regions, and the environment to fulfill their corporate social responsibility. Overall, Canon’s ambition is to add to “global prosperity and the well-being of mankind as [they] continue [their] efforts to bring the world closer to achieving kyosei.” (Canon, 2016) Sensitive Information the company contains or uses Canon has below sensitive information, our security plan will protect them. As

Information Security Essay

1990 words - 8 pages Running Head: INFORMATION TECHNOLOGY Information Security Introduction Information security is understood to be the way wherein which information is being secured within the organization. It is a must to check it upon that thing are likely to be understood at its best. It is a must to identify that organization should make it sure that all the confidential information is being protected and is safe from any kind of attack. The

Information Security Essay

1620 words - 7 pages 1. Why is information security a management problem? What can management do that technology cannot? Management is responsible for implementing information security to protect the ability of the organization to function. They must set policy and operate the organization in a manner that complies with the laws that govern the use of technology. Technology alone cannot solve information security issues. Management must make policy choices and

Information Security Evaluation Essay

633 words - 3 pages Information Security Evaluation CMGT 441 June 16, 2014 Information Security Evaluation Introduction In today's age where technology is constantly developing and shifting faster than most individuals can recognize, one feature stand dependable is company resources. Of these resources, none seems more significant in the age of instant media than information. Safeguarding information can be crucial to a failure or achievement of the