Internet Security Practices in Organization Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

Since its inception, the Internet has experienced threats in its underlying communications network and nodes, protocols, network administration as well as host systems.

These threats have repeatedly been located in the security mechanisms of the hosts (Doddrell, 1995, Highland, 1996), examples being the capacity to obtain unauthorized private access, and the aptitude to gain unauthorized access to passwords. Furthermore, the commercial usage of the Internet has introduced new threats, such as the interception of data in transit by competitors or criminals.

Hackers, competitors, disgruntled employees and ex-employees have been exploiting Internet threats (Doddrell, 1995), forcing banks to recognize the changed nature of the Internet environment from uncompetitive and trustworthy to competitive and hostile. There is also increasing fear within the banking sectors over threats emanating from their own, trusted employees.

In other words, banks and other organizations are not only exposed to Internet threats from outside their boundaries, but also represent threats to other internet users. This rather new Internet security problem for organizations demands solutions in the form of different security policies, procedures and mechanisms.

This paper will discuss acquired expertise, judgment and maturity on the subject of cyber/information security, as well as Internet security policy and associated procedures which convey security guidance and rules to an organization and its employees.

Organization’s policy on the use of corporate digital resources

The networking of distributed data and documents requires the interoperability of systems and services, which in turn require standards. In the development of an Internet security policy for a bank, it is essential that the risks to the organization arising from the Internet connection be addressed.

This requires the detection of pertinent risks, followed by a prioritization of the risks by the use of a risk assessment (Gollmann, 1999). Banks need to implement holistic perspectives in any solution to information security (Hartmann, 1995; Hitchings, 1995; Lichtenstein, 1996; Yngstrom, 1995), and for this reason, their Internet security policies should include administrative, human and technical Internet security considerations.

Though, organizations have largely disregarded the need for Internet security policy. This may be partly because of the limited guidance which has been available for the development and definition of such policy.

In line with this, the framework for an organization’s Internet security policy must considers the Internet risks experienced by the organization, and features a holistic approach to development. Use of the framework will allow the production of well-structured, comprehensive and effective Internet security policies for the organizations (Engestrom, 2000).

Internet Security Policies

Various Internet security policies for banks exist; for example, the NASA Internet Acceptable Usage Policy (NASA, 1996). Though, current bank policies appear to be acceptable usage policies, or information protection policies, the following six sub policies form part of an organization’s Internet security policy:

  • Enterprise Internet acceptable usage policy
  • Employee Internet acceptable usage policy
  • Internet information protection policy
  • Internet information publication policy
  • Internet information access policy
  • Internet employee privacy protection policy

Each of these is summarized below:

Enterprise Internet acceptable usage policy: This policy should contain guidelines for the organization indicating acceptable and unacceptable uses of their Internet connection

Employee Internet acceptable usage policy: This policy should contain the security responsibilities for individual employees, and the acceptable and unacceptable purposes for which the employees may use the organization’s Internet connection.

Internet information protection policy: This policy should contain guidelines for the protection of the organization’s information resources from risks emanating from other Internet participants.

Internet information publication policy: This policy should contain guidelines for the division, allocation, electronic publication, and dissemination of information via the Internet.

Internet information access policy: This policy should contain guidelines for allowing and disallowing access to an organization’s information resources via the Internet.

Internet employee privacy protection policy: This policy should contain guidelines for providing an organization’s employees with privacy protection from other Internet participants.

Conclusion

Standards and practices for interoperability of digital information in the banking sector must incorporate the means to authenticate senders, receivers, sources, data, and documents, and to determine copyright and access permissions (Baskerville, 1988).

Finding ways to address these requirements while facilitating open access to information ease of use, and adaptation to local practices is among the grander challenges of constructing an information infrastructure (Agree, 2003). With the implementation of empirical data indicating current and planned activity in Internet security policy within organizations, it is obvious that success can be achieved.

Reference List

Agree, P. E. (2003). Information and institutional change: The case of digital libraries. Cambridge, MA: MIT Press.

Baskerville, R. (1988). Designing Information Systems Security. Hoboken, New Jersey: John Wiley & Sons.

Doddrell, G. R. (1995). “Information security and the Internet”. Information Management & Computer Security, 3(4), 15-19. doi: 10.1108/09685229510123629

Engestrom, Y. (2000). . Ergonomics, 43(7), 960-974. Web.

Gollmann, D. (1999). Computer Security. Hoboken, New Jersey: John Wiley and Sons.

Hartmann, A. (1995). Comprehensive information technology security: A new approach to respond ethical and social issues surrounding information security in the 21st Century. Eleventh International Conference on Information Security, 13(2), 100-220. Web.

Highland, H. J. (1996). Random bits & bytes & bytes. Computers & Security 16(1), 4-13. Web.

Hitchings, J. (1995). Achieving an integrated design: The way forward for information security. Eleventh International Conference on Information Security, 13(2), 100-220. Web.

Lichtenstein, S. (1996). Information security principles: a holistic view. Melbourne, Australia: Monash University Press.

NASA. (1996). NASA Internet acceptable usage policy. Technical report, 14(8), 220. Web.

OECD. (1992). . OECD/GD, 190(92), 166. Web.

Yngstrom, L. (1996). A Systemic-Holistic Approach to Academic Programmes in IT Security. Eleventh International Conference on Information Security, 13(2), 220. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, April 14). Internet Security Practices in Organization. https://ivypanda.com/essays/internet-security-policy/

Work Cited

"Internet Security Practices in Organization." IvyPanda, 14 Apr. 2019, ivypanda.com/essays/internet-security-policy/.

References

IvyPanda. (2019) 'Internet Security Practices in Organization'. 14 April.

References

IvyPanda. 2019. "Internet Security Practices in Organization." April 14, 2019. https://ivypanda.com/essays/internet-security-policy/.

1. IvyPanda. "Internet Security Practices in Organization." April 14, 2019. https://ivypanda.com/essays/internet-security-policy/.


Bibliography


IvyPanda. "Internet Security Practices in Organization." April 14, 2019. https://ivypanda.com/essays/internet-security-policy/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1