Keeping Information Secure Research Paper

Keeping Information Secure Information Systems

If I were the Chief Intelligence Officer for an organization, there would be a number of things I would do to keep my organization's information secure. I would first make sure I had an extremely comprehensive knowledge of the kind of technology that best serves my organization. The kind of precautions a CIO must need to take are in part contingent on the kinds of technology and the kinds of information that need to be secured. Not all information systems are the same and they all do not serve the same function, though clearly there are general commonalities. Walton suggests that for all organizations, these five steps should be as follows:

Establishing and maintaining a meaningful and relevant security policy; Ensuring that...

...

(Walton, 2001)
Each organization should have a very transparent security policy. The security policy should be clear, stringent, and with specific consequences for security breaches as well as improvement to security. Furthermore, the IT staff, specifically, must be well trained, well supported, and kept up-to-date regarding security policies and relevant technologies to uphold the security policy. Whitman (2003) additionally contends that organizational information security also depends on accurately assessing and categorizing the kinds of threats are present and likely…

Sources Used in Documents:

References:

Walton, M. (2001). Five ways to secure your organizations information systems. Tech Republic, Web, Available from: http://www.techrepublic.com/article/five-ways-to-secure-your-organizations-information-systems/1060329. 2012 November 14.

Whitman, M.E. (2003). Enemy at the Gate: Threats to Information Security. Communications of the ACM, 46(8), 91 -- 95.


Cite this Document:

"Keeping Information Secure" (2012, November 23) Retrieved April 29, 2024, from
https://www.paperdue.com/essay/keeping-information-secure-106820

"Keeping Information Secure" 23 November 2012. Web.29 April. 2024. <
https://www.paperdue.com/essay/keeping-information-secure-106820>

"Keeping Information Secure", 23 November 2012, Accessed.29 April. 2024,
https://www.paperdue.com/essay/keeping-information-secure-106820

Related Documents

Cloud computing is a trend in technology providing cost control and real agility business benefits. Nevertheless, services based on cloud computing are currently floating outside privacy and security standards, which is likely to be decades old thus failing to address concerns such as shared tenancy and virtualization (Gibson, 2011). Similarly, cloud computing comes with more challenges; providers of cloud services are likely to outsource third party experts and if such

The Cincom CRM system also has areas where the sales teams can also enter in total contract value and the total budget for a given initiative as well. Both internally gained financial information from within the customer and the reported financial results, more easily obtained if the customer is publicly held, go into deciding which customers are the most worth investing in over time. There are also analyses completed

Installation The author of this report has been presented with a hypothetical situation as ZXY Corporation where a new building has been procured. This building will be the site of the new information technology (IT) and other infrastructures. However, the current setup is very raw and unfinished and this obviously needs to change. The facets of the information technology setup that will be addressed in this report will include a

Information Technology Change Management in Home Health Care I hope enjoyed time holidays. Now back work . In team task week, a topic weekly focus debate paper labor unions change process. There sufficient information argue sides. Let . See: The labor union change process difficult employees management; I labor union make process a bit easier parties. Implementing Information Technology Change in a Health Care Facility There is a shift from the traditional institutionalized

Linux Kernel Analysis Much has been written in praise of the Linux (Crandall, Wu, Chong, 359), (Parnas, 112), (Baliga, Iftode, Chen, 323), and its use of preemptive multitasking memory architectures to manage process control, file management, device management, information maintenance and communications subsystems securely and effectively. The Linux modular design, lack of reliance on Remote Procedure Calls (RPC), and use of UNIX-based system administration all are often cited as factors in how

This process of prescreening travelers before they board the plane is one of the most important parts of the security system. Electronic Privacy Information Center, 2008); (United States Government Accountability Office, 2007) Another system which was in use since the late 1990s and discontinued after 9/11, was the Threat Image Protection -- TIP system. TSA has also implemented the PMIS or Performance Management Information System which helps to gather