Information Classification Article Review

¶ … Classification Securing information is vital in the modern business world to assist in safeguarding organization's assets of value such as stored data. Nonetheless, most firms view information security as inhibitor in achieving business goals thus, they initiate ineffective procedures which render information access and storage meaningless. In this regard, this paper aims at discussing information classification and supporting evidence why organizations should initiate classification of information in their daily operations.

Information Classification

In the modern world, businesses handle different types of information which require securing and storing in different ways. Therefore, a classification system is necessary whereby information is organized and polices introduced on ways of handling the information according to its class and security mechanisms enforced on systems handling information accordingly (Blackley, Peltier, & Peltier, 2003). Information classification involves categorization of information organizations claim is sensitive which could prejudice the organizations' security as well as public perceptions. Access to the information termed as classified is thus restricted by organizational as well as federal laws; to access such information, a formal security clearance is required.

...

In addition, for these organizations information is classified according to its actual value and level of sensitivity in order to deploy the appropriate level of security. Thus, the classifications system should be easy to understand and use; the number of information classification levels are supposed to few to make management and compliance easier to most individuals. Most firms classify their information in several levels ranging from top secret information which is accessed by a few individual to unclassified information which is open to the general public. Highlighted below are the most common levels of information classification system initiated by most firms.
The first level is top secret which are highly sensitive internal documents and data. This includes investment plans and imminent acquisitions which could seriously damage the organizations when leaked to the public. The next level is highly confidential which when lost can disrupt the firms' ongoing operations. Information in this level includes patient's medical records, business plans as well as citizen bank details of citizens.

The next level is proprietary which entails operational work routines and project plans and is…

Sources Used in Documents:

References

Blackley, J.A., Peltier, J., & Peltier, T.R. (2003). Information Security Fundamentals, 1st Ed. Auerbach Publications.

Byrnes, C.F., & Kutnick, D. (2001). Securing Business Information: Strategies to Protect the Enterprise and its Network. Intel Press.

Kang, L.S., & Paulson, B.C. (1997). Adaptability of Information Classification Systems for Civil Works. Journal of Construction Engineering and Management, 123 (4), 419-426.


Cite this Document:

"Information Classification" (2012, December 26) Retrieved April 24, 2024, from
https://www.paperdue.com/essay/information-classification-105544

"Information Classification" 26 December 2012. Web.24 April. 2024. <
https://www.paperdue.com/essay/information-classification-105544>

"Information Classification", 26 December 2012, Accessed.24 April. 2024,
https://www.paperdue.com/essay/information-classification-105544

Related Documents

classification and risk analysis are some of the major initiatives that companies consider to be very expensive and unwarranted in relation to protection measures to business need. As a result of this consideration, organizations prefer seeking information technology support organizations to identify information that needs protection and the degree of protection as well as the technology solution. However, information classification is still an important protection measure to business need

Classification in Prison
PAGES 6 WORDS 1896

Classification in Prison Classification Systems Classification systems aid in the minimization of the upheaval of prison violence, institutional delinquency, and break out situations. During the past several years, professionals in prisons and those that are employed in correctional systems have worked unremittingly in order for them to improvise their recent approaches in the classification of offenders i.e. In accordance with work, supervision, and programming needs. The process of classification takes place in

Information Systems Define an Information System and Types of Information Systems An information system comprises the hardware and software components necessary to create, store, manage, share, and maintain data. The type of information system selected depends on the specific needs of the user or the organization. There are three basic types of information systems: transaction information systems, management information systems, and decision support systems ("Types of Information Systems," n.d.). Decision support systems are

Information Systems (IS) and Technology Issues in Developing Countries Technology has changed society in a manner much like the Industrial Revolution of the 17th century. The technology revolution started in the U.S. And the countries of Western Europe, in a manner similar to the industrial revolutions. The benefits of this revolution were immediately obvious in the improvement of productivity and the quality of life in the countries. Realizing the benefits that

End Notes 1) Given the recent tardy but well-meaning responses by the federal, state and local officials in the Gulf Coast, it can be assumed that the nation remains relatively unprepared for a terrorist attack of September 11-proportions. The U.S. is struggling to negotiate a nuclear arms treaty with Iran and North Korea (the latter having recently agreed to forego additional nuclear weapons testing in exchange for light-water nuclear reactors, a

During 1879, Morgan visited the pueblos, simultaneously directing the attention of the Bureau of Ethnology in 1879 to the pueblos. The plain historical relationship between the prehistoric Puebloan ruins and the living Pueblos captivated the interest of both Powell and Morgan. For several years, Powell steadily collected material relating to Pueblos and ruins in the southwestern portion of the United States. During the summer of 1879, Powell sent out an