Information Security Concepts and Policies Essay

Exclusively available on IvyPanda Available only on IvyPanda
Updated: Feb 19th, 2024

Network Security Concepts and Policies by Catherine Paquet

She explains that there are several new assumptions that people should make about the security of their information and computer networks because the changes witnessed in this sector expose people to risks. First, she believes that modern networks are large, interconnected, and run on ubiquitous and proprietary protocols that are very risky (Paquet 2013). In addition, she argues that there has been an increase in the complexity of computers attached to these large networks; therefore, this has become a serious challenge because it is not easy to analyze, secure, and taste the security of their systems and application (Paquet 2013).

We will write a custom essay on your topic a custom Essay on Information Security Concepts and Policies
808 writers online

Therefore, she argues that the basic security requirements for such systems and their applications involve the provision of confidentiality of data to ensure only authorized people can access view, and use sensitive data. She proposes that network security designers should know the threats possible in computers and their applications and assess their risks (Paquet 2013). In addition, she argues that they should also assess the cost of implementing their preferred security measures and determine whether they are economical.

Implementing Information Security: Risks vs. Cost by Gideon T. Rasmussen

This author argues that there is a need for managers and other senior stakeholders to ensure that they are in regular contact with security professionals so that they can be updated on the latest technology and applications of securing their systems. He claims that managers cannot easily estimate the benefits of a secured network and computer application, but its losses are usually huge and can make investors close their businesses (Rasmussen 2005). In addition, he claims that there is a need for data recovery plans and checks that will ensure companies do not expose themselves to threats and believes that dishonest and disgruntled workers are usually the biggest perpetrators of internet fraud. The prudent man principle and concept of due diligence are compulsory in organizations to ensure every employee is committed to protecting the safety of sensitive information (Rasmussen 2005).

References

Paquet, C. (2013). Web.

Rasmussen, G. T. (2005). Web.

Print
Need an custom research paper on Information Security Concepts and Policies written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2024, February 19). Information Security Concepts and Policies. https://ivypanda.com/essays/information-security-concepts-and-policies/

Work Cited

"Information Security Concepts and Policies." IvyPanda, 19 Feb. 2024, ivypanda.com/essays/information-security-concepts-and-policies/.

References

IvyPanda. (2024) 'Information Security Concepts and Policies'. 19 February.

References

IvyPanda. 2024. "Information Security Concepts and Policies." February 19, 2024. https://ivypanda.com/essays/information-security-concepts-and-policies/.

1. IvyPanda. "Information Security Concepts and Policies." February 19, 2024. https://ivypanda.com/essays/information-security-concepts-and-policies/.


Bibliography


IvyPanda. "Information Security Concepts and Policies." February 19, 2024. https://ivypanda.com/essays/information-security-concepts-and-policies/.

Powered by CiteTotal, reference machine
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1