logo

Culture and Information Systems Security

   

Added on  2023-06-03

6 Pages1131 Words491 Views
Running Head: Information Security 0
Information Security
Culture and Information system security
(Student Details:)
10/12/2018

Information Security 1
Contents
Culture and Information Systems Security................................................................................2
Introduction................................................................................................................................2
Developing professionally secure culture through information system security.......................2
Accidental data corruption.....................................................................................................3
Loss of intellectual property...................................................................................................3
Theft of information from hackers.........................................................................................3
Theft of information by employees........................................................................................3
Web site defacement..............................................................................................................3
Software piracy..........................................................................................................................4
Conclusion..................................................................................................................................4
References..................................................................................................................................5

Information Security 2
Culture and Information Systems Security
Introduction
The purpose of this report is to apply academic knowledge about Information systems
security (referred as ISS) for analysing as well as planning ISS solutions for a small
organization.
This report aims to assess and apply that academic knowledge acquired to establish a safe as
well as secure working environment in small and medium-sized enterprises (referred as
SAME). Our proposed methodology will help to introduce and examine an information
security model well-suited for SAME.
Developing professionally secure culture through information system
security
Small enterprises pay little attention to cyber criminals, security threats, hackers, and
malicious insiders’ threats to their information system. Further, SAME are required to have
proper ISS strategies due to inadequate resources (Legg et al., 2015).
Our proposed method includes four ISS initiatives as below:
Developing of automatic tools to analyse methodology, knowledgebase and heuristics
Developing a multi-stage ISS risk analysis method as well as decision heuristics
Developing decision heuristics for firm’s costs quantification
Developing and maintaining knowledge base of possibility estimates related to threat
classes
The most needed practices comprise providing system security for firm’s internet connection,
protecting information systems from destruction by spyware, viruses, and other malicious
codes, use and timely activate firewalls software over all business systems, reinforcing all
operating systems and applications. If the company control physical entree to computers as
well as its network components, and will make backup documents of vital business data or
information then the ISS can be achieved (The Economic Times, 2018).

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network and Security: Threat Control
|14
|1775
|486

Computer Networks and Cybersecurity: Threats and Controls
|13
|1739
|446

Network and Security: Threats and Controls
|10
|1781
|75

Threat Categories for Information Security: Prevention and Detection Techniques
|13
|1796
|257

Network and Security - Threats and Controls
|14
|1843
|104

Network and Cybersecurity: Threats and Control Measures
|13
|1909
|314