logo

Sample Assignment on IS Security

   

Added on  2021-04-17

5 Pages1001 Words31 Views
 | 
 | 
 | 
Running head: IS SECURITYIS SecurityName of the StudentName of the UniversityAuthor Note
Sample Assignment on IS Security_1

1IS SECURITYIntroductionAn information system can be network computer concern that gives a processing of samesoftware by many numbers of users assessing the same. An information system satisfies theneeds of all the required information of the organization. It processes and changes the datamanagement according to the organizations strategic plan (Safa, Von Solms and Furnell 2016).In this report we will be talking about the security policy of eBay.DiscussionWhen data are stored in the form of digital rather than manual it brings the organizationadvantages and disadvantages as well advantages can be taken in the form that data storingbecomes easier and accurate with less difficulty in data handling while on the other hand brings alot of threat to data misuse or theft to the organization (Galliers and Leidner 2014). For thispurpose eBay follows a formal, brief and high level plan to implement security policies to forman overall control. It lays out the guidelines of the information resources that the employee needsto use. Business security and control are the value for the eBay (Laybats and Tredinnick 2016). On the basis of three guidelines confidentiality, integrity and availability the securitypolicy is framed in such a manner that the information of an organization like eBay has to berestricted to access by only its authorized user but not to any outsider or unauthorized person(Peltier 2016). For example, the customer’s personal information including name, mobilenumber, address and bank details has to be restricted to be accessed by any third party. Comingto the second, integrity of eBay has to be truly represented that was intended. For example, thedeal regarding a purchase of product between the customer and the organization has to be
Sample Assignment on IS Security_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security: Holiday Inn Australia
|11
|3103
|1

Professional Skills In Information Communication Technology: Cyber Security
|20
|6717
|27

Information Security Management: Risks, Prevention, and Frameworks
|11
|2362
|381

Information Security: The Royal Children's Hospital
|11
|3171
|107

Developing a Strategic Security Policy for Choice Hotels International
|11
|3214
|352

INFORMATION SECURITY AND SAFE COMPUTING.
|3
|427
|83