logo

IEEE Transactions on Information Theory

   

Added on  2022-09-12

12 Pages2817 Words14 Views
 | 
 | 
 | 
Running head: INFORMATION SECURITY AND RISK MANAGEMENT
INFORMATION SECURITY AND RISK MANAGEMENT
Name of the Student
Name of the University
Author Note
IEEE Transactions on Information Theory_1

1INFORMATION SECURITY AND RISK MANAGEMENT
Executive Summary
The information security and the information privacy are the two sides of a coin. To
maintain privacy of information, security of information is required. The report deals with the
research methods and approach that is used for the evaluation of the topic. The report deals
with the results that are obtained from the research. The report discusses about the
discussions about the information security and information privacy including the scope and
the limitations of the topic. From the report, it can be inferred that information security and
information privacy are most important. They walk hand in hand and without information
security, the privacy of information is not possible.
IEEE Transactions on Information Theory_2

2INFORMATION SECURITY AND RISK MANAGEMENT
Table of Contents
Introduction................................................................................................................................3
Research Methods and Approach...............................................................................................3
Literature Review...................................................................................................................4
Results........................................................................................................................................5
Discussions.................................................................................................................................7
Conclusions................................................................................................................................8
References................................................................................................................................10
IEEE Transactions on Information Theory_3

3INFORMATION SECURITY AND RISK MANAGEMENT
Introduction
Information security is a sequence of practices those are intended in order to keep data
protected from unauthorized access or modifications, both when the data is stored and when
the data is broadcasted from one machine to another machine. It is sometimes known as the
data security. As information has become an essential resource, efforts in order to keep the
information secure have become increasingly essential.
The privacy of information is the privacy of information that is personal and relates to
the personal data that is stored on the systems of computer. The requirement to maintain the
privacy of information is applicable to the personal information those are collected such as
medical records, financial data, records of criminals, records of political and the information
related to business. The privacy of information is known as the privacy of data.
The information security and the information privacy are the two sides of a coin. To
maintain the privacy of information, security is required.
The report deals with the research methods and approach that is used for the
evaluation of the topic. The report deals with the results that are obtained from the research.
The report discusses about the discussions about the information security and information
privacy including the scope and the limitations of the topic.
Research Methods and Approach
The information security and the information privacy is very important for an
individual as well as for a company. It is important to secure the information in order to
maintain the privacy of information (Padyab 2018). The method that is applied in this report
is secondary research.
IEEE Transactions on Information Theory_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Research Methods for Privacy and Security Breaches Due to Readability of Terms and Conditions
|11
|2518
|88

Secondary and Primary Issues in Analytics - Dumnonia Corporation
|16
|4692
|53

Research Ethics Form Management Research Methods
|5
|1070
|196

Technology In Organisation
|12
|3844
|383

Research Methodology for Risk Management
|11
|1476
|24

Ethics and Information Security Research Paper 2022
|13
|2659
|20