logo

Information Security Standard Assignment

8 Pages2161 Words105 Views
   

Added on  2020-03-16

Information Security Standard Assignment

   Added on 2020-03-16

ShareRelated Documents
Running head: INFORMATION SECURITY STANDARDInformation Security StandardName of the StudentName of the UniversityAuthor note
Information Security Standard Assignment_1
1INFORMATION SECURITY STANDARDThe need for an International Information Security Standard for Small MediumEnterprisesIt has been seen that due to insufficient and inadequate management of proper securityarrangements and unexpected security incidents the small-scale industries had already suffered ahuge loss of data and privacy information (Yeboah-Boateng and Essandoh, 2014). The need ofproper security management technologies is a must in any organisation maybe it is a large-scaleindustry or any small-scale industry. A resolution to this delinquent may be the controlled and byproper management of the security schemes. However, there are enough evidences that thesecurity practices are not strongly upheld within small and medium enterprise environments. Asurvey revealed that the SME’s lack this basic need because of the mismanagement of budgetand this type of things are often handed to non-experts without proper qualification. This resultsin loss of data and rupturing of private information of the organisation. Without proper securityarrangement a SME can even come down to verge of extinction.Risk assessment can be defined as the as the calculation done of intimidations, impactsand susceptibilities of data and info processing and the chances of occurring of these events.Also, the procedure of risk management may be defined as the identification, collection andexecution of counter measures that are premeditated to reduce the identified levels of risk toacceptable levels, this way governing, minimalizing and potentially eradicating theacknowledged security risks, at an acceptable cost (Melendez, Dávila and Pessoa, 2016). Thethree basic terms related to the information security management are confidentiality that is thedata must be accessible completely to official parties, integrity which means the completenessand accuracy of the data must be well-preserved and obtainability that is the authorised usersmust access the data when required.
Information Security Standard Assignment_2
2INFORMATION SECURITY STANDARDData safety is a far-off multifaceted question than Information Technology security. Atthe present time it is not sufficient to contemplate in terms of firewalls, antivirus packages,unswerving hardware and clear-cut credentials systems. The mindful creation of the high-techcircumstantial is no longer sufficient (A. Harris and Patten 2014). The integrity, accessibility,and secrecy of data is mainly exposed by careless management or decisive mutilation by thehands of core workers through the establishments data control systems and or the internet andtactical associates with admittance via the internet, extranet or Automated Information Exchangeto corporations databases contractors, vendors, collaboration associates and economic facilityworkers (Lo and Chen 2012). Numerous other assets, such as accurateness, liability, non-repudiation, and reliability may also be connected to data security. There are many information security requirements as mentioned by the internationalsafety of the US and the UK the that any organisation needs to follow. Firstly, the need for riskassessments, risks must be understood and recognised. The IT security measures that are takenmust be proportionate with these risks (Dillon and Vossen, 2015). Organizations needs to create,interconnect, implement, approve, monitor, and impose security strategies across theorganization. Organisations needs to make every employee of the organization aware of theimportance of IT security and to train the employees good IT security practices (Shameli-Sendi,Aghababaei-Barzegar and Cheriet, 2016). The organisation also needs to monitor audit and runregular security checks regularly in order to eradicate any incoming threat.Some of the security metrics that a small-scale industry needs to follow are the number ofthe previous reported incidents. The number of viruses or other malicious code outbreak are alsoto be recorded (Kimwele, 2014). Keeping a track of the unethical websites are also to be kept inthe mind. Frequency of the IT systems failures are also to be checked regularly.
Information Security Standard Assignment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Systems Risk Management - PDF
|8
|2075
|102

Assignment on Effective Information Security & Risk Management Strategy
|6
|1137
|95

The Need for an International Information Security Standard for Small Medium Enterprises
|7
|1879
|416

Creativity, Enterprise and Innovation
|10
|2608
|269

ITC 595 - Information Security- Risk Management
|9
|2004
|47

System Administration Assignment
|7
|867
|234