1,539
9
Essay, 4 pages (900 words)

Information and system security

Information and System Security Information security means protecting information and information systems from un ized access, use, disclosure, disruption, modification, or destruction. The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms.
The field of information security has grown and evolved significantly in recent years. As a career choice there are many ways of gaining entry into the field. It offers many areas for specialization including Information Systems Auditing, Business Continuity Planning. Information security is the ongoing process of exercising due care and due diligence to protect information, and information systems, from unauthorized access, use, disclosure, destruction, modification, or disruption. The never ending process of information security involves ongoing training, assessment, protection, monitoring & detection, incident response & repair, documentation, and review.
In recent years identity management has become increasingly important, especially in the financial services, healthcare and government industries. Why identity management has emerged as a growing business and IT priority is no mystery. Obvious drivers include the need to protect one’s intellectual property, data brand value and customer loyalty from the potential damage wrought by electronically-based fraud and theft; the desire to cut technical support costs, increase productivity through self-service and enable integration across disparate platforms. Less obvious reasons, but equally important, include the challenges presented by changing environments, such as mergers, outsourcing, federated systems and global infrastructures, as well as industry and government regulations such as HIPAA, Sarbanes-Oxley and Gramm-Leach-Bliley acts.
The dictionary defines hackers as, ” a talented amateur user of computers, specifically one who attempts to gain unauthorized access to files on various systems.” (Webster’s pg. 610) In other words, a hacker is a person who creates programs that infiltrate your PC and steal valuable information. It’s hard to put a face on a criminal when he works miles away from you but is still just as effective as any other criminal. Thanks to Hollywood and the young group of kids that crowd the Internet; hackers have almost been made out to be artist-like. The movie ” Hackers” make its characters seem like misunderstood geniuses looking to express themselves. The Internet community doesn’t help debunk the idea when in chat rooms and message boards you’ll find its contributors immortalizing them.
Hackers do more than just create programs to steal files. ” Many notorious hacks were not feats of programming, but masterful psychological ploys” (TLC, 2006). Hackers play on people’s fear of viruses to cause damage to their PC’s. Hacker hoaxes can be just as bad as getting a virus. For example, an email in 2002 was sent out warning people about a virus that may be on their computer (TLC, 2002). The email instructed them to delete a certain file on their hard drive because of it’s virus but the file was actual vital to running Windows and deleting the file would make Windows crash.
Internet security should be a high priority on every person’s list that owns a computer. It makes sense since the majority of PC owners use their computer to hold valuable information, rely on it for their work, and count on it as a tool for every day life. An attack could potentially destroy your computer and all the information saved within it.
Even worse, that information could possibly be used by someone else just like a thief would steal your belongings from your home to sell. Prevention has come along way in addressing the issue of hackers but everyday hackers are coming up with new way to attack your PC. The Internet is a great thing. It’s not perfect but even its imperfections shouldn’t deter your desire to explore the vast wealth of information that makes up the Internet. Being aware of risks and taking steps to protect yourself will ensure that you can explore the Internet without fear.
References
http://www. galileo. usg. edu
http://www-935. ibm. com/services/us/index. wss/detail/imc/a1022935cntxt= a1000405
http://searchsecurity. techtarget. com/originalContent/0, 289142, sid14_gci1094140, 00. html
http://www. cisecurity. org
http://www. bastille-unix. org
http://www. puschitz. com/SecuringLinux. shtml
http://www. owasp. org
http://www. hardened-php. net/suhosin/
http://php. net/features. safe-mode
http://www. sans. org/rr/whitepapers/securecode/23. php) http://www. securesynergy. com/library/securityscape/index. php
Anti-Phishing Work Group. (2006). Retrieved April 21, 2006, from
http://www. antiphishing. org/
Best Buy. (2006). Guide to Firewall Technology. Retrieved March 11, 2006 from
http://www. bestbuy. com/site/olspage. jspguideID= 1043363099960&type= page&id= cat12077
Best Buy. (2006). Internet Security and Monitoring. Retrieved March 11, 2006 from
http://www. bestbuy. com/site/olspage. jsp type= category&id=
Cybercrime. (2003). I Love You Virus. Retrieved April 21, 2006 from
http://library. thinkquest. org/04oct/00460/ILoveYou. html
Downloads. com. (2006). Top Ten Spyware- Killers. Retrieved March 1, 2006 from
http://www. download. com/Ten-Spyware-Killers//1200- 2023_4-5157375. html
IBM. (2000). Virus Timeline. Retrieved April 21, 2006 from
http://www. research. ibm. com/antivirus/timeline. htm
Jerry Honeycutt. (2004). How To Protect Your Computer from Spyware and Adware.
Retrieved March 6, 2006 from
http://www. microsoft. com/windowsxp/using/security/expert/honeycutt_ spyware. mspx.
L-Soft. (1999). LISTSERV. Retrieved April 21, 2006 from
http://www. lsoft. com/products/litserv_av. asp
Linux Kernel Archives. (1996). Orange Book Preamble. Retrieved April 21, 2006 from
http://www. kernel. org/pub/linux/libs/security/Orange-Linux/refs/Orange/Orange0-5. html
Neufeldt, V (1991). Webster’s New World Dictionary. New York, NY: Webster’s.
Newsfactor Magazine. (2006). Why Can’t Hackers Be Stopped. Retrieved April 21, 2006 from
http://www. newsfactor. com/perl/story/19830. html
Now Know How. (2004). Hackers. Retrieved April 21, 2006 from
http://nowknowhow. com/hackers. html
PBS. (2001). A Hacker’s Tools of the Trade. Retrieved April 21, 2006 from
http://www. pbs. org/wgbh/pages/frontline/shows/hackers/whoare/tools. html
Symantec. (2006). Security Advisories. Retrieved April 21, 2006 from
http://symantec. com/avcenter/global/index. html
TLC. (2006). Hackers: Outlaws and Angels. Retrieved April 21, 2006 from
http://tlc. discovery. com/convergence/hackers/articles/hoaxes. html
Wikipedia – The Free Encyclopedia. (2006). Phishing. Retrieved April 21, 2006, from
http://en. wikipedia. org/wiki/Phishing

Thank's for Your Vote!
Information and system security. Page 1
Information and system security. Page 2
Information and system security. Page 3
Information and system security. Page 4
Information and system security. Page 5
Information and system security. Page 6

This work, titled "Information and system security" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Information and system security'. 10 October.

Reference

AssignBuster. (2022, October 10). Information and system security. Retrieved from https://assignbuster.com/information-and-system-security/

References

AssignBuster. 2022. "Information and system security." October 10, 2022. https://assignbuster.com/information-and-system-security/.

1. AssignBuster. "Information and system security." October 10, 2022. https://assignbuster.com/information-and-system-security/.


Bibliography


AssignBuster. "Information and system security." October 10, 2022. https://assignbuster.com/information-and-system-security/.

Work Cited

"Information and system security." AssignBuster, 10 Oct. 2022, assignbuster.com/information-and-system-security/.

Get in Touch

Please, let us know if you have any ideas on improving Information and system security, or our service. We will be happy to hear what you think: [email protected]