Information Security Concepts and Policies Essay

Exclusively available on Available only on IvyPanda®
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Network Security Concepts and Policies by Catherine Paquet

She explains that there are several new assumptions that people should make about the security of their information and computer networks because the changes witnessed in this sector expose people to risks. First, she believes that modern networks are large, interconnected, and run on ubiquitous and proprietary protocols that are very risky (Paquet 2013). In addition, she argues that there has been an increase in the complexity of computers attached to these large networks; therefore, this has become a serious challenge because it is not easy to analyze, secure, and taste the security of their systems and application (Paquet 2013).

Therefore, she argues that the basic security requirements for such systems and their applications involve the provision of confidentiality of data to ensure only authorized people can access view, and use sensitive data. She proposes that network security designers should know the threats possible in computers and their applications and assess their risks (Paquet 2013). In addition, she argues that they should also assess the cost of implementing their preferred security measures and determine whether they are economical.

Implementing Information Security: Risks vs. Cost by Gideon T. Rasmussen

This author argues that there is a need for managers and other senior stakeholders to ensure that they are in regular contact with security professionals so that they can be updated on the latest technology and applications of securing their systems. He claims that managers cannot easily estimate the benefits of a secured network and computer application, but its losses are usually huge and can make investors close their businesses (Rasmussen 2005). In addition, he claims that there is a need for data recovery plans and checks that will ensure companies do not expose themselves to threats and believes that dishonest and disgruntled workers are usually the biggest perpetrators of internet fraud. The prudent man principle and concept of due diligence are compulsory in organizations to ensure every employee is committed to protecting the safety of sensitive information (Rasmussen 2005).

References

Paquet, C. (2013). Web.

Rasmussen, G. T. (2005). Web.

Print
More related papers
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2021, May 22). Information Security Concepts and Policies. https://ivypanda.com/essays/information-security-concepts-and-policies/

Work Cited

"Information Security Concepts and Policies." IvyPanda, 22 May 2021, ivypanda.com/essays/information-security-concepts-and-policies/.

References

IvyPanda. (2021) 'Information Security Concepts and Policies'. 22 May.

References

IvyPanda. 2021. "Information Security Concepts and Policies." May 22, 2021. https://ivypanda.com/essays/information-security-concepts-and-policies/.

1. IvyPanda. "Information Security Concepts and Policies." May 22, 2021. https://ivypanda.com/essays/information-security-concepts-and-policies/.


Bibliography


IvyPanda. "Information Security Concepts and Policies." May 22, 2021. https://ivypanda.com/essays/information-security-concepts-and-policies/.

Powered by CiteTotal, reference machine
If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Cite
Print
1 / 1