Case Overview of Security Issues

Case Overview of Security Issues

Order 100% Plagiarism free paper

Module 1 – Case
OVERVIEW OF SECURITY ISSUES
Assignment Overview
According to Pesante (2008) there are three basic security concepts that are important to information on the Internet. Those are: confidentiality, integrity, and availability. In addition, she indicates that there are three additional concepts relating to the people who use information which are authentication, authorization, and nonrepudiation. Please read the full article that explains these concepts.
Pesante, L. (2008). Introduction to Information Security. Retrieved from the World Wide Web on 05/20/09 from http://www.us-cert.gov/reading_room/infosecuritybasics.pdf
Solutions to achieve information security are multi-faceted and require collaborations from multi-parties. It is not easy to assure information security, such as in the dimensions mentioned above. The following article broadens one’s views on security. Even though it focuses on the protection of infrastructure, one can learn from its methods of approaching security to solve other kind of security problems. It is a long article. You don’t need to read word-by-word. Please focus on the key concepts.
White House. (2009). Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure. White House.
The following essays are much shorter and easier to read. They offer different perspectives and especially with unique views on the role of the government.
Schneier, B. (2012), The Big Idea: Bruce Schneier. February 2012.
Gonsalves, A. (2012), RSA 2012: Three Greatest (and Surprising) Internet Security Dangers, CRN.
Case Assignment
Prepare a 3- to 4-page paper addressing the question:
“How to Achieve Business Information Security in Cyperspace?”
Assignment Expectations
Use information from the modular background and case readings as well as any good quality resource you can find. Please cite all sources and provide a reference list at the end of your paper.
The following items will be assessed in particular:
Your ability to consolidate ideas from reading materials.
Your demonstration of your understanding of various dimensions of IT securities and available IT security solutions.
Your ability to apply your understanding in national security policy in cyberspace to a business or an organization.

source..

Get a 20 % discount on an
order above $ 120
Use the following coupon code :
today2015

error: Content is protected !!