Verified Document

Information Classification Article Review

¶ … Classification Securing information is vital in the modern business world to assist in safeguarding organization's assets of value such as stored data. Nonetheless, most firms view information security as inhibitor in achieving business goals thus, they initiate ineffective procedures which render information access and storage meaningless. In this regard, this paper aims at discussing information classification and supporting evidence why organizations should initiate classification of information in their daily operations.

Information Classification

In the modern world, businesses handle different types of information which require securing and storing in different ways. Therefore, a classification system is necessary whereby information is organized and polices introduced on ways of handling the information according to its class and security mechanisms enforced on systems handling information accordingly (Blackley, Peltier, & Peltier, 2003). Information classification involves categorization of information organizations claim is sensitive which could prejudice the organizations' security as well as public perceptions. Access to the information termed as classified is thus restricted by organizational as well as federal laws; to access such information, a formal security clearance is required.

In addition, for these organizations information is classified according to its actual value and level of sensitivity in order to deploy the appropriate level of security. Thus, the classifications system should be easy to understand and use; the number of information classification levels are supposed to few to make management and compliance easier to most individuals. Most firms classify their information in several levels ranging from top secret information which is accessed by a few individual to unclassified information which is open to the general public. Highlighted below are the most common levels of information classification system initiated by most firms.
The first level is top secret which are highly sensitive internal documents and data. This includes investment plans and imminent acquisitions which could seriously damage the organizations when leaked to the public. The next level is highly confidential which when lost can disrupt the firms' ongoing operations. Information in this level includes patient's medical records, business plans as well as citizen bank details of citizens.

The next level is proprietary which entails operational work routines and project plans and is…

Sources used in this document:
References

Blackley, J.A., Peltier, J., & Peltier, T.R. (2003). Information Security Fundamentals, 1st Ed. Auerbach Publications.

Byrnes, C.F., & Kutnick, D. (2001). Securing Business Information: Strategies to Protect the Enterprise and its Network. Intel Press.

Kang, L.S., & Paulson, B.C. (1997). Adaptability of Information Classification Systems for Civil Works. Journal of Construction Engineering and Management, 123 (4), 419-426.
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now