Information Security Threats

1271 Words6 Pages

1. Introduction

Information security "a well – informed sense of assurance that information risks and controls are in balance" Jim Anderson, inovant (2002). Its means protection of information and its critical elements, including systems and hardware that use for, store and transmit information.
The history of information systems security being immediately after the first main frames were developed in the past the system was very risky because the system controls was limited access, no safety procedures for system. The securities of computer just include safety of data and limiting unauthorized access to data. In 1990 networks of computers became more common so too did the need to interconnect network and internet become first manifestation …show more content…

Organization or company which used this system will faced threats that affect and vulnerable to information system. Threats which attack information system come from a variety of places inside or outside to an organization. In order to secure system and information , each company or organization should analyze the type of threats that will be faced and how these threats affects information system security, example of threats such as hacker , cracker, computer virus, theft, sabotage , vandalism and accidents .
There are different type of security policies, guidelines, standards and procedures. Organization must be following the instruction to ensure the information security. All these policies are written by information security officer.
Implementing information system security with so many different ways and so much potential to information system, organization must establish a control system to strengthen the security of its information. To make an effective information security system an organization should establish effective imperative procedures for example,
• Educating …show more content…

Security audits should be also performed regularly. Information security officer must ensure the security of organization data and information recourse, also must be ensure that all the policies are going in perfect way and train the staff about security and privacy responsibilities. ISO have to plan, develop, manage and direct the information security program. Threats are the actors or situation that might accidentally affect information system. Every one of us individuals, organization or company is threatened and potentially vulnerable to the threats we must be aware and controls. Through awareness and controlling system we can protect personal or organization data

More about Information Security Threats

Open Document