Verified Document

Information Security Term Paper

¶ … Security is of utmost importance in this digital world where technology has not only expedited our information processing speed but also made information more transparent, with the consequent security implications. The rapid growth of Internet technology and the phenomenal pace at which ecommerce is growing have created new security concerns to be dealt with. We are at a greater risk now from potential hackers and other nosey netizens who use the same technology to gain access to, impersonate, damage and wreak havoc using the anonymous web medium. Firewalls, antiviral programs, authentication systems and secure protocols are different ways of ensuring the safety of the system.

Firewalls constitute the first line defense of our network as they are strategically positioned at the entry point of the network to monitor all input and output data. Firewalls perform the function of filtering data to and from the network and allow only authorized traffic to pass through, which in effect immunizes or shields our computer from outside attack. Perimeter firewalls are designed to protect the network from outside attacks but they leave the network defenseless to internal attacks. Distributed firewalls on the other hand protect the system from both internal as well as external attacks. Antivirus programs are designed to eliminate the risk of potential damage that could be caused by viruses and other kind of malicious codes that float freely on the net. They are memory resident and effectively scan all downloaded data for the presence of worms and viruses. (Ex Norton Antivirus).

User authentication using a password system is the most commonly used security system for restricting access and for preventing impersonation. Passwords are secured using various types of encryption techniques so that even if a snooper manages to intercept it on the net he cannot meaningfully interpret it. Currently 128-bit encryption is the industrial standard as it provides the greatest security. The latest protocols ensure the security of online transactions by encrypting data at the sender's end and decrypting the same at the receiver's end. At present most ecommerce companies use SSL (Secure Socket Layer) protocol. The SET (Secure Electronic transaction) and PCT (Private Communication technology) are other emerging technologies.

Effecting security of information is a complex task, which involves coupling a variety of security systems like firewalls, Antivirus programs, Intruder detection systems and secure transmission protocols.

Cite this Document:
Copy Bibliography Citation

Related Documents

Security Information Security Is a Primary Concern
Words: 809 Length: 2 Document Type: Essay

Security Information security is a primary concern for consumers and businesses. In "IT security fails to keep pace with the rise of cloud computing," the author claims that in spite of the advancements in cloud technology, information security has not kept pace. This assessment is rooted firmly in fact and best practices in the information security industry. Although their analysis is thorough, the authors would do well to point out the

Information Security Management
Words: 549 Length: 2 Document Type: Essay

Security Management Information Security Management Managing the information security at a major university is never an easy task, and especially with a team of only ten the complexities and the resource demands can sometimes make the situation seem all but impossible even on the best of days. When the former head of information security management suddenly departs as the result of an FBI arrest -- and when that arrest stems from the

Security Information Security and Risk Management in
Words: 1322 Length: 5 Document Type: Term Paper

SECURITY Information Security and Risk Management in IT This essay is designed to present and discuss both an assessment of information security and risk management in IT systems and a comparative discussion of important academic theories related to security and risk. In the first section, An assessment, a conceptual framework will emerge including reference to important terminology and concepts as well as an outline of legislation and authorized usage examples. In the

Security at Work Information Security Within the
Words: 576 Length: 2 Document Type: Essay

Security at Work Information Security within the nursing fraternity With the advent of consolidated information storage within the nursing fraternity, there has grown the need to have better security and controlled access to such information that may be considered confidential and for the use by the nurse and the patient alone. When anyone wants therefore to have access to the documents I will always need to verify several details just to be

Information Security and Employees
Words: 1440 Length: 4 Document Type: Term Paper

Information Security The discussion below provides answers to questions raised with regard to a case at Greenwood Company A forensic plan of readiness comes with several advantages. If there arises a situation that forces a company to be engaged in litigation, and there is need for digital evidence, e-discovery is of central importance. The laws and rules that govern the e-discovery, such as the Federal Rules of Civil Procedure or the Practice

Information Security
Words: 3704 Length: 10 Document Type: Research Proposal

Security A broad definition of information security is given in ISO/IEC 17799 (2000) standard as: "The preservation of confidentiality (ensuring that information is accessible only to those authorized to have access), integrity (safeguarding the accuracy and completeness of information and processing methods), and availability (ensuring that authorized users have access to information and associated assets when required" (ISO/IEC 17799, 2000, p. viii). Prior to the computer and internet security emerged as we

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now