Thursday, April 25, 2019

W5Security Essay Example | Topics and Well Written Essays - 1250 words

W5Security - try ExampleModern technology poses a threat in terms of ease of access to information and information which is exchanged over the Internet, which can compromise the privacy of both individuals as well as confidential information pertaining to business activities (Laudon & Laudon, 1999). Privacy is the freedom individuals have to be left alone both at home and at work, free from observation or intrusion by other individuals or the State, or in the case of organizations, from the State and unauthorized sources. Information technology and systems threaten individual rights to privacy by making the intrusion into privacy inexpensive, cost- tackive, and efficient (Laudon & Laudon, 1999).Organizational information security strategies, measures, and standards are simply significant reflections. An organization must take care to devise and put into practice a self-made information safety plan, that can cover every phase of available information. Each category of such infor mation safety serves a diverse function. The W5-Data Security Policy incorporates the following main points regarding the organizational entropy (W5- information security Policy, 2009)Security risk Consumer based applications such as Internet sales and call mall programs pose a security risk to data at its collection point, because they can be tapped by unauthorized sources.(www.protegrity.com). The data and information security risk can be illustrated as the intensity of its effect on organization activities (including operational jobs, illustrations, or status), organization assets, or on individual and/or financial information collected during the process of entering into business information arrangements. The security of data may also be compromised during the process of its use, such as for example through actual theft or hacking into data as well as insider theft, all of which pose a hazard (Rebecca, 2007).The above section has presented the practical hazards in a busines s situation. Such

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.