Information Systems : The Security Mechanisms, Privacy, Accessibility, And File Integrity

Information Systems : The Security Mechanisms, Privacy, Accessibility, And File Integrity

Length: 1201 words (3.4 double-spaced pages)

Rating: Better Essays

Open Document

Essay Preview

Organizations today face many ominous cybersecurity concerns that must be addressed systematically and effectively to protect the organization, their customers, and their employees. Information systems which house significant amount of data can be extremely alluring to hackers. Thus, ensuring the classification, uprightness, and accessibility of databases ought to be incorporated as a component of the security arrangement for each association. Vulnerabilities and threats identified within our research has harmed their credibility, integrity, and confidentiality of iTrust databases. iTrust database must maintain security regulations to support security mechanisms, privacy, accessibility, and file integrity. File sharing policies and regulations should be implemented regarding patents and employee’s record files to prevent uncovering potential breaches, threats and/or vulnerabilities in its framework. iTrust can shield itself from that developing danger of cybercrimes through compliance agreements and regulations.

Secure Web Enabled Databases
Efforts to establish security protocols have not been legitimately enforced by iTrust. Non-existing and or weak security mechanisms in Web enable databases allow various classes of assaults to occur, for example, Denial of Service (DoS) attacks to transpire, which can upset the accessibility and integrity of the Web enables applications. For example, SQL Injection is an attack where a hacker can execute harmful structured query language (SQL) coding to control a web application 's database server. ADD SOURCE. SQL Injection could influence any site or web application that makes utilization of a SQL-based database and are the most commonly utilized, and most hazardous of web application vulne...


... middle of paper ...


... is 2FA?). Multi factor authentication can be utilized to protect remote access, applications, and database access without comprising its effectiveness. Users utilizing two factor authorizations are able to create something they want and will only know. Two-factor authentication primary is can be achieved by the use of security tokens or biometric authentication. There are two types of security tokens, offline and online tokens. Online security tokens contain a chip embedded in the card such as a smart cards or a PIV cards and offline security tokens are RSA tokens. Biometric authentication is the utilization of a retina and fingerprint scanners are applied to user’s verification process to determine their personal identity. Letting users store their password in their system is insecure; attacks could gain access to other systems based on the passwords stored there.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Essay on Data Security And Information Assurance

- Pradeep Kumar Chagantipati Cuw id: F00437246 Data Security and Information Assurance: Data Security • Data security is defined as keeping the data safe and restricting unauthorized access. • The key role of data security is to guarantee protection while ensuring individual or corporate information. • Data is stored as columns and rows in our databases, system servers and computers. Information could be anything that can be perused or generally interpreted in human form. • In order to prevent unauthorized access, we need to follow certain methods to ensure data is secure  Encryption: Here data is encrypted, only the receiving end possess a decoding key....   [tags: Information security, Computer security, Security]

Better Essays
727 words (2.1 pages)

Security Program Must Be Layered At Every Level Of The Organization Essay

- Question One A security program needs to be layered at every level of the organization. Having a layer of security missing in the program could result in the jeopardizing of the entire framework. Each layer is meant to support and protect the other layers set in place. (Harris, 2012, p. 35) According to SANS Institute there are at least five elements that are crucial to a security program. The first element is to periodically assess risk. In this element, the goal is to compile and understand the risks from a completed threat assessment, vulnerability assessment, and asset identification....   [tags: Information security, Security, Computer security]

Better Essays
881 words (2.5 pages)

The Security Policies Related On The Data Center / Server Farm / Network Security

- Starting from left to right on the diagram, I will discuss the security policies related to the Data Center/Server Farm/Network Security and assuring information confidentiality, integrity and authorized accessibility, followed by the mechanisms necessary to implement the aforementioned policies. Secure remote access must be implemented; no remote access for administrators. Authorized Users shall protect their login and password, even from family members. It is the responsibility of employees with VPN privileges to ensure that unauthorized users are not allowed access to our internal networks....   [tags: Security, Computer security, Access control]

Better Essays
1061 words (3 pages)

What Is Information Security And Why It Is Important? Essay

- What is Information Security and why it is Important. Information security refers to “the process and methodologies that are designed and implemented to protect print, electronic, or any other form of confidential, private and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption” (SANS Institute, n.d.). Information security programs are important in maintaining confidentiality, integrity, and availability (figure 1 page X). For example, a Trojan horse was planted on your system and result in the loss of customers’ personal and financial information....   [tags: Information security, Computer security, Error]

Better Essays
1679 words (4.8 pages)

The Security Management Practices And Regulations On A Quarterly Basis Essay

- The security manager will review and update all policies in regards to any federal regulations or other best practices and regulations on a quarterly basis to ensure we are in compliance with all necessary laws and acts. Doing this quarterly allows us to identify any weak points or violations quickly in order to correct them and harden our security policy continuously. With all aspects of our IT security policy, we are continuously looking for ways to improve our existing security infrastructure....   [tags: Security, Computer security, Risk]

Better Essays
1119 words (3.2 pages)

Security and Private Issues in Ecommerce Essay

- SECURITY AND PRIVATE ISSUES IN ECOMMERCE INTRODUCTION: Privacy means that the control over data and security of one is the attempt to access the data by other unauthorized . These are two critical issues facing by both consumers and e-commerce sites alike. Since the invention of the World Wide Web , electronic commerce based on the Internet has grown from a simple idea into reality. Consumers browse through catalogs , finding the best deals, order goods and pay electronically ....   [tags: Privacy, Data Control, Security, Consumer Sites]

Better Essays
1441 words (4.1 pages)

Essay on Computer Security Policy And Assurance Of Policy Implementation

- Computer Security Computer security is an important issue and threats to the computer must be countered through various access controls and safety measures. Authorized accesses, avoidance of malicious software, prevention of applications from hackers are the steps that make a system secure. The fundamentals of computer security include an understanding of security policy stating laws, practices and regulations to manage and protect sensitive information. Enforcing a devised security policy and assurance of policy implementation are other important aspects of computer security....   [tags: Computer security, Computer, Authorization]

Better Essays
866 words (2.5 pages)

Essay about Security and Privacy on SAT´s (IRS) Electronic Signature

- Introduction New information technologies change the way society lives. This is why the tax authorities cannot remain outside such changes. Since the year 2005 the Tax Administration System (SAT Servico de Administracion Tributaria), which is the Mexican IRS, has been introducing and applying new information technologies with the objective of a better, faster and safer way of fulfilling its obligations with taxpayers. One of the most controversial tools the SAT started using is the Electronic Signature (FIEL Firma Electronica)....   [tags: privacy, security, biometric features]

Better Essays
1916 words (5.5 pages)

Essay on Information Security, Services, And Inter Connectivity

- PURPOSE The wide array of new resources, services, and inter-connectivity available through the Internet all introduce new business opportunities, and new security and privacy risks. In response to the risks, this policy describes the Company X official policy regarding Internet security. SCOPE AND APPLICABILITY This policy applies to all workers, employees, contractors, consultants, temporaries, and volunteers, who use the Internet with Company X computing or networking resources. Within this policy, the term “Internet” is used to reference all electronic communications which access the internet, including web sites, internet relay chat (IRC), message boards, or blogs....   [tags: Internet, World Wide Web, Computer security]

Better Essays
1244 words (3.6 pages)

Network Security Essays

- Network Security When it comes to networking and the security of networks, there are several different methods of protecting networks. Of these differing methods, some of them sound similar, but provide differing levels of security. In the following paragraphs, I will try to explain the differences between some of the methods used. • Explain the difference between historical and statistical logging. Logging is a simple way of keeping a record of activity on a network. There are several types of logs that can be kept, each providing different data that can be analyzed to provide information on potential ways of improving security over time....   [tags: Network Security Hacking ]

Better Essays
932 words (2.7 pages)