Sunday, May 24, 2020

Information Assurance And Security Issues - 1308 Words

Information Security Issues J00496794 Shravya gone Abstract This paper presents the information security risks in daily life. In this paper I will discuss the information assurance risks and discuss each threat by providing asset, threat source, threat cause and provide the countermeasures for each threat. This paper also provides the background of the issues (i.e, literature review) and ends with the conclusion and the future work. Introduction Nowadays information assurance is one of the most challenging field. It has a crucial role in our daily life. Information security is securing the information and its components. We can define the value of information by its categories such as availability, integrity, confidentiality. Management†¦show more content†¦People have many details in the smart phones like credit card, debit card details and all the passwords, when this is lost then that would be the big issue. †¢ Threat Source Category: Unintentional Insider can be the threat category for mobile device attacks. †¢ Information Asset: Cell phones and laptop itself is the information asset †¢ Asset Category: Data/ Information is the asset category. †¢ Threat Cause: Negligence is the cause of the threat. Countermeasures: The basic prevention countermeasure is a strong password for the laptop and the mobile device. Must install the GPS tracker in our laptop and mobile phone so that we can track the device when it is lost or stolen. Should activate the microphones even though if the phone is off. Must install a protection software and also should not enable the automatic login to the applications. The final thing is backup the data frequently. Social Media: The employees accessing their social media sites from the company s network results in risks when they click on the malicious links on social networking sites which let the hijackers attack their system. If the hackers target the employee in the company then he will gather all the information about the employee like Facebook profile, mobile devices, passwords, working hours and also tracks the target. We also face the danger by some applications like games from where the hackers can gain the passwords and personal information. †¢ Threat SourceShow MoreRelatedInformation Security And Assurance Department924 Words   |  4 PagesInformation Security and Assurance Department Because of identity theft, terrorism, and other criminal activities, President Obama has made information security a national priority. Not only is information security and assurance an American priority, it is also a global issue. Information security and assurance includes of data confidentiality, integrity, and availability along with accountability and confidence all is well with the processes (White, G. L., Hewitt, B., Kruck, S. E. 2013). OurRead MoreInformation Security And Assurance Department1685 Words   |  7 PagesInformation Security and Assurance Department Within any organization, Information Security and Assurance has a huge role in protecting the network systems by all means necessary. This is why the Information Security and Assurance Department plays a key role in defeating the threat of today and the future. The first and foremost task we must execute is to conduct an analysis on the current information technology systems. Upon recognizing and discovering several issues within the organization’s existingRead MoreA Complete Risk Mitigation Strategy997 Words   |  4 Pagesfor IA programs and organizations. An incident response and disaster recovery plan in the event of intrusion and disaster how well and organization deals with incidents gives a picture of how well they have implemented their IA plan. Gathering information is an important part of any plan in the military we used a term called rearward or backward planning. I mentioned this to help explain how I intend to develop my incident response plan. Planning before during and after an incident putting on yourRead MoreTaking a Look at Information Warfare1781 Words   |  7 PagesINTRODUCTION Over the last decades, information warfare has become a societal issue. Research shows that information warfare does not exclude to military, and have penetrated into commercial word. This issue, is a threat for organization and their assets. (Knapp,Boulton, 2006) Information is a valuable asset for businesses and organizations. Advances in information technology facilities the storing, transferring, and modifying of data. Organizations use information technologies such as the InternetRead MoreQuestions On Procurement Desktop Defense Operations1643 Words   |  7 PagesOperations Freddy R. Orellana American Military University Information Assurance for Procurement Desktop Defense (PD2) How to protect PD2 operations in a network environment? PD2 is the primary software used by the Department of Defense (DoD) for the acquisition of all commodities, supplies, and services required to accomplish the mission worldwide. Therefore, the proper application of the information assurance (IA) principles is vital in order to create a secure environment. To accomplishRead MoreInformation Assurance Is Important For Our Future Business Essay1248 Words   |  5 PagesAs web technology usage increase for businesses so does the need for security. Our web presence here at Information Assurance is very important to the growth of the business. Our webservers are a crucial element of our web infrastructure and a single vulnerability can lead to a security breach which can affect Information Assurance’s creditability. Which is why we must have webserver security a high priority for our growing business. Our webserver hosts our website over the internet for client interactRead MoreInformation Assurance Policies Developed Within The Title Insurance Industry1729 Words   |  7 PagesIntroduction How are information assurance policies developed within the title insurance industry? While each organization can choose to follow its own path, there is an established set of best practices available. These best practices are available from the American Land Title Association, and they address most of the issues that are related to information assurance in the industry, but do these practices completely cover all of the necessary areas of information assurance or are there weaknessesRead MoreThe Types of Feedback Support and Advice That Internal Assessment and Quality Assurance Staff May Need960 Words   |  4 Pages4.1 Critically compare the types of feedback, support and advice that internal assessment and quality assurance staff may need to maintain and improve the quality of assessment Types of feedback, support and advice that internal assessment and quality assurance staff may need to maintain and improve the quality of assessment include verbal, written, directive, developmental, guidance, and signposting. Verbal feedback includes straightforward verbal responses from staff, clients, or stakeholdersRead MoreRole Of Core Technologies On An Effective It System Essay714 Words   |  3 Pagesdifferent function in today’s era. The core roles of these technologies play an important part to keep this world as we know it to operating on a day to day basis. The basis of the technology that makes IT System useful is Computer Networks, Information Assurance, Wed Technologies, Database, Computer Programs and Programming. In order for IT System to become active first Computer Programs and Programming must be put in place. Computer Programs and Programming are simple terms an executable set of commandsRead MoreEssential Operations Of Information Systems1487 Words   |  6 PagesThe essential operations of information systems sustained by of critical infrastructure rely on the explicit functionality of software applications supporting complex, interdependent, information systems. The software application provides the virtual framework for information systems to operate efficiently in a critical infrastructure. Information systems consistently communicate with supplementary information systems positioned throughout the network to support the infrastructure’s essential operations

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.