logo

Importance of Information Security Laws and Regulations

6 Pages1114 Words442 Views
   

Added on  2020-05-28

Importance of Information Security Laws and Regulations

   Added on 2020-05-28

ShareRelated Documents
Running head: INFORMATION TECHNOLOGYInformation Technology (IT) Governance Policies and Procedures of Deloitte ProjectName of the Student:Name of the University:
Importance of Information Security Laws and Regulations_1
1INFORMATION TECHNOLOGY1. Importance of information security laws and regulationsRebollo et al., (2015) stated that regulatory as well as security laws and regulations areimportant aspect of the information security which are important for the Deloitte Project. Theinformation security regulations are comprised of directives which would safeguard theinformation technology as well as computer systems from any type of attacks or stolen. Thesecurity professionals are expected to respect the laws as well as regulations which would governthe use of both computers and information. If the laws and regulations are outdated, then there ispossibility of hacking of the information from any unauthorized person. 2. Impacts of information security laws and regulations on informationsecurity program In the age of the advanced technology, protection of the information becomes importantas protecting the property of the organization. It is the practice to protect of physical as well asdigital information from any type of unauthorized access. The purpose of the informationsecurity program is to offer the overview of the laws and regulations, standards which make abetter IT security program of the organization. When there are perfect rules and regulations ofthe organization, then only a proper information security program is conducted (Wu, Straub &Liang, 2015). It is the responsibility of the users to make sure of confidentiality of theinformation from unauthorized access, integrity along with availability of the information storedand processed by the information system. Compliance with the applicable laws and regulations,policies govern the information security as well as protection of privacy. The impact ofinformation security rules and regulations provides the management and users with detailed
Importance of Information Security Laws and Regulations_2
2INFORMATION TECHNOLOGYunderstanding of the project goals and implemented controls to secure the information assets ofthe organization. 3. Information security risks with attention to the organizational,governmental, and regulatory requirementsThe risks of information security are as follows:Inadequate system logging: The organizational team can login into the system withoutthe permission of authorized person. Then, the information and data are stolen by unauthorizedperson and shared it with others (Thompson, Ravindran & Nicosia, 2015). Therefore, when anyunauthorized person can login into the system, there is possibility of hacking of confidentialinformation saved into the database of the organization. Outdated information system: All the information system should require to be updatedon time, then the information are lost from the system. Therefore, maintenance and update ofsecurity software are required to protect the information. Security software is required to defendagainst the known threats (Hums & MacLean, 2017). Any malicious code which is of outdatedversion of security will be undetected.Improper security regulations: The organization may not follow a strict rules andregulations of information security. Storage, sending and encryption of the data haveimplications for safety. When improper regulations are taken, it results into exposure of data. Italso causes of data breaches and loss of sensitive data.
Importance of Information Security Laws and Regulations_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security in Banking System
|5
|1352
|96

Target Data Breach: Threats, Protections, and Legal/Ethical Issues
|8
|1725
|99

Cyber Security Assignment | Security Breach
|10
|1891
|117

THE DEVELOPING POLICY
|6
|1084
|17

Banking System Breach Case Study
|6
|1430
|347

Cyber Security in Corporate Governance: Ways to Improve Cyber Resilience and Integration with Cyber Security
|12
|3215
|375