Information Security Strategies and Decision Making Essay

Exclusively available on IvyPanda Available only on IvyPanda

Even though technology has advanced dramatically over the past decades, there’s still no such thing as perfectly safe and secure information. In this constantly changing, fast-paced world, human beings continue to invent and reinvent, create and recreate to suit the present needs – in this case, preserving and protecting information while maintaining an open environment that gives users the freedom to know. Knowing what is going around and knowing who to interact with can help a user decide how secure the information will be.

We will write a custom essay on your topic a custom Essay on Information Security Strategies and Decision Making
808 writers online

In the possible realm, perfect security can be attainable. However, human beings live in a world filled with uncertainties which makes predicting the exact outcome impossible. Everything has been properly planned and arranged, every single detail has been studied and still something unexpected goes wrong. Anticipating and considering the unexpected will just give someone a headache and cause a computer to break down.

Despite the impossibility, there is still something that one can do: Prepare as best as possible. An individual can keep sensitive information hidden so deep that no one could find it but make some readily available to the common man. As the situation calls for it, there are levels of information to be given depends upon the person who needs it. Common people need common information while sensitive and extremely meticulous people need the same sensitive information.

The human mind is creative but complex. It is at a constant change so human beings can cope with the passing times. It aims to improve on what is currently at hand and if possible, attain perfection in any given field. Charles Babbage’s Analytical Engine won’t become as sophisticated as the present-day computer if it weren’t for the creativity of the human mind. Neither would there be a cure to counter new computer threats if the human mind wasn’t this inventive. If a person has something that is deemed necessary, something will be done to deal with that need. Necessity is indeed the mother of invention.

The world today has become much more complicated compared to some 50 years ago. Almost everything in this world is controlled in part by computers. Before, data is being processed manually to come up with the correct information. Stenography, typewriters, pen, and paper, were used daily, not to mention long hours on end sitting in front of a table scribbling notes and computations. There were blocks and blocks of filing cabinets overflowing with written material that is sometimes hard to deal with.

Human beings finally thought that manual processing of data should be replaced with a much more efficient system. This system will make storing and retrieving data faster, easier, and much more efficient. Transferring and sharing information between people no matter how far they are from each other would only take seconds. With the advent of modern methods of communication and the internet, information has become much more flexible and accessible to the hungry public. That dream has become a reality.

Nevertheless, the reality has presented itself with a number of problems that shouldn’t be ignored. Every day, a personal computer that is linked to the web is at a constant threat from technological assaults. There are unscrupulous individuals who want to test their technical ingenuity in a more destructive field. Computer viruses, Trojans, worms, spyware for example persistently knock at each computer system’s door. These malicious programs tick at the system, look for vulnerabilities and exploit it once found. Information, particularly sensitive data are at risk: bank accounts, passwords, company profiles, literally any kind of information that would be very useful to the infiltrator. A need to keep the information safe has sprouted from the ground.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

To counter these attacks, different companies have developed programs to stop these malicious codes from entering the system. Antiviruses, anti-spyware, firewalls, internet security software have been introduced to the market. Some of these programs have a more subtle approach such as messages and innocent-looking electronic mails. While Product A promises to keep your system safe from these attacks, product B also says the same but with an added feature. On the other hand, product C will argue that it does even better because it has combined features of both A and B. Despite all these efforts, there are still vulnerabilities that ruthless individuals exploit just to get what they want.

To completely eliminate all vulnerabilities is quite impossible for the time being – given the uncertainties. Turning off the computer is one way but only works for an individual and at a given period of time. Big organizations can’t just shut the system off to keep their sensitive data safe from attacks. In fact, according to an article published by the National Institute of Standards and Technology in 1998, a university computer system, even a sophisticated government system wasn’t able to completely defend itself. Crackers look for different ways to find their way into a system and come out undetected. Successful break-ins are regrettably a reminder to everyone that not a single system is completely safe from destruction.

Since it is almost impossible to determine who would just browse and search for answers from who would wreak havoc, there are methods that can be employed to help a person decide when to maximize security while keeping information readily available to others.

Establishing a strong system infrastructure is one way to secure data. Depending upon a system, determining its basic needs such as network addresses, firewalls, restrictions, security software, antivirus software, and other necessary software, even the personnel involved can point out whether the vulnerability is minimized or not. A strong foundation can withstand many challenges in the long run. Once the basic needs are satisfactorily met, it can advance to the next stage: System improvement.

Keeping a watchful eye for weak points, new programs, or software, and then applying creativity and inventiveness combined with caution can strengthen defenses while allowing information to be easily accessible. Taking notes on problems that were encountered and what were done to temporarily solve their help. However, no matter how powerful the defense maybe, if there are points that were overlooked, there’s still faces great risk.

The Trojans could have lasted much longer or even have won the battle against the Greeks if they didn’t let the makeshift horse through its gates. Programs such as turning numbers, passwords or passphrases, alphanumeric codes, sign-in seals can decrease the chances of retrieving information illegally. However, too many passwords aren’t that effective and would increase the dangers. After discerning the weakness of the system, applying the changes comes next.

Applying the changes can strengthen further a given system and delay crackers even more. Now that the weaknesses are determined, immediate action is strongly suggested since every second count. Once the changes are already applied, the cycle will then repeat itself. It is through this cycle that a powerful defense could be attained.

Remember! This is just a sample
You can get your custom paper by one of our expert writers

Now that the defense is there to help, giving information to people who couldn’t be trusted poses another problem. Human beings still have the final say as to who it is to be given to and what is to be given. Before its release, consultations with the concerned personnel are advised since they know what to do with it. Very sensitive information requires extreme care. There are literally millions of users who access the net daily so there’s no telling who’s going to cause trouble from those who won’t. Technology can be an aid but can also be a threat like a knife that can be useful and at the same time deadly. Deciding on how to secure information should be lies solely with the personnel involved.

The 300 Spartans were left with no choice but to defend themselves as long as they can against the forces of Xerxes. The terrain favored them but became utterly useless when a traitor leaked a piece of single, vital information that brought the Spartans to their demise. In an organization, every single person is considered a suspect unless tried and tried to an extent that trust is already bestowed on that personnel. Trust is hard to gain but easy to lose. Everyone has the responsibility to take care of the information entrusted to them. If for example, a person is confused, just ask.

References

Miller, M. (2005) Computer Security: Fact Forum Framework. Web.

Boran, S. (2005) Overview of Corporate Information Security. Web.

Angus, J. (2005) Jurassic Plaque: The U-curve of Security. CIOInsight. Web.

National Institute of Standards and Technology. (1998) Management Of Risks In Information Systems: Practices Of Successful Organizations. Web.

Print
Need an custom research paper on Information Security Strategies and Decision Making written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2021, August 18). Information Security Strategies and Decision Making. https://ivypanda.com/essays/information-security-strategies-and-decision-making/

Work Cited

"Information Security Strategies and Decision Making." IvyPanda, 18 Aug. 2021, ivypanda.com/essays/information-security-strategies-and-decision-making/.

References

IvyPanda. (2021) 'Information Security Strategies and Decision Making'. 18 August.

References

IvyPanda. 2021. "Information Security Strategies and Decision Making." August 18, 2021. https://ivypanda.com/essays/information-security-strategies-and-decision-making/.

1. IvyPanda. "Information Security Strategies and Decision Making." August 18, 2021. https://ivypanda.com/essays/information-security-strategies-and-decision-making/.


Bibliography


IvyPanda. "Information Security Strategies and Decision Making." August 18, 2021. https://ivypanda.com/essays/information-security-strategies-and-decision-making/.

Powered by CiteTotal, best reference machine
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1