Home > Free Essays > Tech & Engineering > Computer Security > Information Security Concepts and Policies
Rate

Information Security Concepts and Policies Essay

Exclusively available on IvyPanda Available only on IvyPanda
Updated: May 22nd, 2021

Network Security Concepts and Policies by Catherine Paquet

She explains that there are several new assumptions that people should make about the security of their information and computer networks because the changes witnessed in this sector expose people to risks. First, she believes that modern networks are large, interconnected, and run on ubiquitous and proprietary protocols that are very risky (Paquet 2013). In addition, she argues that there has been an increase in the complexity of computers attached to these large networks; therefore, this has become a serious challenge because it is not easy to analyze, secure, and taste the security of their systems and application (Paquet 2013).

Therefore, she argues that the basic security requirements for such systems and their applications involve the provision of confidentiality of data to ensure only authorized people can access view, and use sensitive data. She proposes that network security designers should know the threats possible in computers and their applications and assess their risks (Paquet 2013). In addition, she argues that they should also assess the cost of implementing their preferred security measures and determine whether they are economical.

Implementing Information Security: Risks vs. Cost by Gideon T. Rasmussen

This author argues that there is a need for managers and other senior stakeholders to ensure that they are in regular contact with security professionals so that they can be updated on the latest technology and applications of securing their systems. He claims that managers cannot easily estimate the benefits of a secured network and computer application, but its losses are usually huge and can make investors close their businesses (Rasmussen 2005). In addition, he claims that there is a need for data recovery plans and checks that will ensure companies do not expose themselves to threats and believes that dishonest and disgruntled workers are usually the biggest perpetrators of internet fraud. The prudent man principle and concept of due diligence are compulsory in organizations to ensure every employee is committed to protecting the safety of sensitive information (Rasmussen 2005).

References

Paquet, C. (2013). Web.

Rasmussen, G. T. (2005). Web.

This essay on Information Security Concepts and Policies was written and submitted by your fellow student. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly.
Removal Request
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda.
Request the removal

Need a custom Essay sample written from scratch by
professional specifically for you?

Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar

certified writers online

Cite This paper

Select a referencing style:

Reference

IvyPanda. (2021, May 22). Information Security Concepts and Policies. Retrieved from https://ivypanda.com/essays/information-security-concepts-and-policies/

Work Cited

"Information Security Concepts and Policies." IvyPanda, 22 May 2021, ivypanda.com/essays/information-security-concepts-and-policies/.

1. IvyPanda. "Information Security Concepts and Policies." May 22, 2021. https://ivypanda.com/essays/information-security-concepts-and-policies/.


Bibliography


IvyPanda. "Information Security Concepts and Policies." May 22, 2021. https://ivypanda.com/essays/information-security-concepts-and-policies/.

References

IvyPanda. 2021. "Information Security Concepts and Policies." May 22, 2021. https://ivypanda.com/essays/information-security-concepts-and-policies/.

References

IvyPanda. (2021) 'Information Security Concepts and Policies'. 22 May.

More related papers
Psst... Stuck with your
assignment? 😱
Hellen
Online
Psst... Stuck with your assignment? 😱
Do you need an essay to be done?
What type of assignment 📝 do you need?
How many pages (words) do you need? Let's see if we can help you!