logo

Information Security

   

Added on  2023-06-04

16 Pages3717 Words433 Views
Running head: INFORMATION SECURITY
Information Security
Name of the Student
Name of the University
Author’s Note:

1
INFORMATION SECURITY
Table of Contents
Executive Summary...................................................................................................................2
Introduction................................................................................................................................3
Discussion..................................................................................................................................3
1. Information Security Plan of WAS Swim Association......................................................3
2. Risk Assessment for WAS Swim Association...................................................................5
3. Classification Table for Confidential Information in WAS Swim Association.................6
4. Solutions for the Identified Risks in WAS Swim Association..........................................9
Conclusion................................................................................................................................11
References................................................................................................................................12

2
INFORMATION SECURITY
Executive Summary
The major objective of the report is knowing about the case study of WAS Swim Association.
This is one of the fictional swimming associations, which is eventually the main body for
complete administrations of each and every swimmer in Western Australia to represent over
500 members and 5 associated clubs. The information security is the security that is being
applied to the computing devices like smart phones and computers and even the computer
networks for securing the confidential information. This type of information is related to the
mechanisms and processes, by which the organization is executing the various business
operations. The unauthenticated data access is promptly stopped as well as mitigated with
information security. Moreover, the data theft and damage is also stopped and hence the
prevention of the service disruption is also possible. This report has properly explained the
various risks and threats associated with the information system of WAS Swim Association.
Proper solutions are also provided in this report for these identified risks.

3
INFORMATION SECURITY
Introduction
Information security could be designed for the protection of the three factors of
confidentiality, integrity as well as availability of the information or data of computer
systems from all those with all types of malicious intentions (Crossler et al., 2013). These
three factors of CIA are together referred to as the triplet of the information security. This
triad of CIA has evolved for including the possession, authenticity, utility, confidentiality,
availability and integrity. The risk management is properly handled with the help of
information security. Anything that could bring the negative impact within the organizational
information system is termed as a risk. The confidential information should not be changed or
altered under any circumstances. The message could be either modified while transmitting it
someone or could be intercepted even before it is reaching to the intended recipient (Von
Solms & Van Niekerk, 2013). There are various methodologies that are quite helpful in
proper control and mitigation of all types of risks and threats.
This report will be providing a brief description on the WAS Swim Association of
Western Australia. The various details regarding this particular organization and the several
threats of the information system of WAS Swim Association would be given here. Moreover,
a risk matrix showing all the risks and their probable solutions would be provided in the
report.
Discussion
1. Information Security Plan of WAS Swim Association
Information security planning for WAS Swim Association is extremely vital and
significant for them to safeguard the data, resources and information (Peltier, 2013). This
type of plan is extremely important for the protection of these above mentioned resources.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security Plan for WASSA Swim Association
|14
|3174
|133

Host and Application Security
|9
|1653
|308

IT Risk Management: Cyber Security
|20
|4610
|231

Guidelines for Managing Information Security Risks for Cosmos Organization
|17
|4535
|385

Cloud Computing: Information Security, BCP, Resource Management, SLA Management
|20
|4947
|200

IT Risk Assessment and Cyber Security Lead Consultant for Gigantic Corporation
|10
|3551
|91