SlideShare a Scribd company logo
How to secure information systems?
Solution
Answer:
Information security:
Information security, sometimes shortened to InfoSec, is the practice of halting unauthorized
access, use, revelation, disordering, modification, investigation, recording or destruction of
information. It is a general term that can be used regardless of the form the data may take (e.g.
electronic, physical).
Since the advent of the internet and increased expansion of computer based technology in
today's corporations, information security breaches have increased at an alarming rate. While
businesses take a more cautious approach to how they handle IT security threats, these are
becoming increasingly complex and sophisticated. Denial-of-service attacks, software tampering
(e.g. Trojan horses and computer viruses) and social engineering techniques (e.g. phishing) are
some examples becoming prevalent. While we often times hear of the more widely publicized
embezzlement, money laundering, burglary and bribery statistics, data has shown that companies
have seen greater losses from losses attributed to information security breaches.
One of the most effective ways to prevent criminals from accessing and compromising
confidential company information is to implement an effective information security plan and
properly train firm employees accessing the system. Additionally, companies should implement
a dynamic and independent third party auditor to frequently test the adequacy of their security
system. Lastly, key responsibilities within the information security chain should be segregated
and rotated frequently. If companies follow these three basic tenets, they will be one step closer
to the effective security of their information.
Threats to Information Systems:
Information security threats come in many different forms. Some of the most common threats
today are software attacks, theft of intellectual property, identity theft, theft of equipment or
information, sabotage, and information infiltration Some of the most prevalent types of data
infiltration include input manipulation, program manipulation, data input manipulation, data
stealing, and outright sabotage. The most frequent type associated with this form of fraud is
manipulation of the data. The reason for this most common is because the criminal requires the
less amount of skill.
Most people have experienced software attacks of some sort. Viruses, worms, phishing
attacks, and Trojan horses are a few common examples of software attacks. Governments,
military, corporations, financial institutions, hospitals and private businesses amass a great deal
of confidential information about their employees, customers, products, research and financial
status. Most of this information is now collected, processed and stored on electronic computers
and transmitted across networks to other computers.
Implementing a Information Security System:
With so many different ways and so much potential for breaches to information security
systems, companies must establish a control system to strengthen the security of its information.
There are seven basic tenets that help strengthen the security of company information systems.
The following seven procedures are imperative to establishing an effective information security
system:
1. Educating employees
2. Establishing quality internal controls
3. Establishing a board of directors and its appointees
4. Establishing a compliant system
5. Establishing an independent audit of the system
6. Developing a structure of accountability
7. Establishing a budget for the information security system;
The Future of Information Security:
The days of “basic firewalls” and basic detection systems to secure information are over.
Viruses, manipulation of data, phishing scams, and even Trojan Horses are just some of the
threats facing information security systems today. In spite of the financial restrictions facing
companies in the present economic environment, information security is not the place that leaves
room to cut corners. Information is one of a company's most precise assets. Security threats of
information systems can have adverse effects on the reputation, status, and overall viability of a
business. Therefore, companies must ensure that they implement an information security system
that is accountable, verifiable, and as dynamic as the business environment in which they seek a
competitive advantage. Those companies abandon the security of their information will
inevitably find themselves at a decided disadvantage to their competitors.

More Related Content

DOCX
Ethical and security issues on MIS inte 322 assignment.docx
PDF
security_threats.pdf and control mechanisms
PPTX
Data Privacy Introduction
PDF
Top 10 Cyber Security Threats and How to Prevent Them
PDF
Protective Intelligence
PPTX
Information security threats
PDF
Whitepaper-When-Admins-go-bad
PPTX
Cyber security
Ethical and security issues on MIS inte 322 assignment.docx
security_threats.pdf and control mechanisms
Data Privacy Introduction
Top 10 Cyber Security Threats and How to Prevent Them
Protective Intelligence
Information security threats
Whitepaper-When-Admins-go-bad
Cyber security

Similar to How to secure information systemsSolutionAnswerInformation.pdf (20)

PDF
Awareness Security Session 2023 v1.0.pptx.pdf
PDF
The Growing Importance of Information Security in the Digital Age.pdf
PDF
Why Is Information Security So Important.docx.pdf
PDF
Mobile Security: 5 Steps to Mobile Risk Management
PDF
Data Leak Protection Using Text Mining and Social Network Analysis
PDF
5 Steps to Mobile Risk Management
PDF
Cybersecurity solution-guide
PDF
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
DOCX
The Importance of Cybersecurity to Secure Business Operations.docx
PDF
Understanding the Biggest Cybersecurity Threats for Businesses Today.pdf
PDF
Data Safety And Security
PDF
Before the Breach: Using threat intelligence to stop attackers in their tracks
PDF
1. introduction to cyber security
PDF
The latest trends in cybersecurity and how to protect yourself.pdf
PPTX
Cyber crime and Information Security.pptx
PDF
Mark Lanterman - The Risk Report October 2015
DOCX
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
DOCX
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
PDF
Top Cyber Security Interview Questions and Answers 2022.pdf
PDF
Fundamentals of Information Security..pdf
Awareness Security Session 2023 v1.0.pptx.pdf
The Growing Importance of Information Security in the Digital Age.pdf
Why Is Information Security So Important.docx.pdf
Mobile Security: 5 Steps to Mobile Risk Management
Data Leak Protection Using Text Mining and Social Network Analysis
5 Steps to Mobile Risk Management
Cybersecurity solution-guide
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
The Importance of Cybersecurity to Secure Business Operations.docx
Understanding the Biggest Cybersecurity Threats for Businesses Today.pdf
Data Safety And Security
Before the Breach: Using threat intelligence to stop attackers in their tracks
1. introduction to cyber security
The latest trends in cybersecurity and how to protect yourself.pdf
Cyber crime and Information Security.pptx
Mark Lanterman - The Risk Report October 2015
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Top Cyber Security Interview Questions and Answers 2022.pdf
Fundamentals of Information Security..pdf

More from rohit219406 (20)

PDF
Below are the transactions and adjustments that occurred during the .pdf
PDF
Help Please. Results not given Explain how your results for the pe.pdf
PDF
As a software developer you have been delegated with the assignment .pdf
PDF
What scientist is credited with proposing the equivalency of mass and.pdf
PDF
Why do countries with high GNI and GDP are attractive for foreign in.pdf
PDF
Which of the following is NOT true about the ESCBA.It acts as an.pdf
PDF
What is 4 -4 + infinity - infinity As x approaches 3 from th.pdf
PDF
Use what you have learned so far to bring variety in your writing. U.pdf
PDF
Use C programmingMake sure everything works only uploadSol.pdf
PDF
Thoroughly describe the molecular underpinnings of ONE and only one.pdf
PDF
The Blackbeard Company Ltd provided the following information in reg.pdf
PDF
Thank you 1. What is responsible for anteriorposterior axis formati.pdf
PDF
Take the basic Hardy-Weinberg Equilibrium equation, where there are a.pdf
PDF
Systems analysis project 10 can you answer the 4 questions at the t.pdf
PDF
Step 1. Read critically and analyze the following scenarioGeraldi.pdf
PDF
Question 3 2 pts In response to the Great Recession, the Federal Rese.pdf
PDF
Prove that the T_i -property is a topological property for i = 0S.pdf
PDF
Q4.14. Which of the following species is most likely to exhibit pate.pdf
PDF
Prepare a classified balance sheet. Do not show the components that .pdf
PDF
Microscopes and telescopes both consist of two converging lenses cont.pdf
Below are the transactions and adjustments that occurred during the .pdf
Help Please. Results not given Explain how your results for the pe.pdf
As a software developer you have been delegated with the assignment .pdf
What scientist is credited with proposing the equivalency of mass and.pdf
Why do countries with high GNI and GDP are attractive for foreign in.pdf
Which of the following is NOT true about the ESCBA.It acts as an.pdf
What is 4 -4 + infinity - infinity As x approaches 3 from th.pdf
Use what you have learned so far to bring variety in your writing. U.pdf
Use C programmingMake sure everything works only uploadSol.pdf
Thoroughly describe the molecular underpinnings of ONE and only one.pdf
The Blackbeard Company Ltd provided the following information in reg.pdf
Thank you 1. What is responsible for anteriorposterior axis formati.pdf
Take the basic Hardy-Weinberg Equilibrium equation, where there are a.pdf
Systems analysis project 10 can you answer the 4 questions at the t.pdf
Step 1. Read critically and analyze the following scenarioGeraldi.pdf
Question 3 2 pts In response to the Great Recession, the Federal Rese.pdf
Prove that the T_i -property is a topological property for i = 0S.pdf
Q4.14. Which of the following species is most likely to exhibit pate.pdf
Prepare a classified balance sheet. Do not show the components that .pdf
Microscopes and telescopes both consist of two converging lenses cont.pdf

Recently uploaded (20)

PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Lesson notes of climatology university.
PDF
Computing-Curriculum for Schools in Ghana
PDF
Updated Idioms and Phrasal Verbs in English subject
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Trump Administration's workforce development strategy
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Complications of Minimal Access Surgery at WLH
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Microbial disease of the cardiovascular and lymphatic systems
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
A systematic review of self-coping strategies used by university students to ...
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Lesson notes of climatology university.
Computing-Curriculum for Schools in Ghana
Updated Idioms and Phrasal Verbs in English subject
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Final Presentation General Medicine 03-08-2024.pptx
Trump Administration's workforce development strategy
Module 4: Burden of Disease Tutorial Slides S2 2025
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Complications of Minimal Access Surgery at WLH
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
2.FourierTransform-ShortQuestionswithAnswers.pdf

How to secure information systemsSolutionAnswerInformation.pdf

  • 1. How to secure information systems? Solution Answer: Information security: Information security, sometimes shortened to InfoSec, is the practice of halting unauthorized access, use, revelation, disordering, modification, investigation, recording or destruction of information. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical). Since the advent of the internet and increased expansion of computer based technology in today's corporations, information security breaches have increased at an alarming rate. While businesses take a more cautious approach to how they handle IT security threats, these are becoming increasingly complex and sophisticated. Denial-of-service attacks, software tampering (e.g. Trojan horses and computer viruses) and social engineering techniques (e.g. phishing) are some examples becoming prevalent. While we often times hear of the more widely publicized embezzlement, money laundering, burglary and bribery statistics, data has shown that companies have seen greater losses from losses attributed to information security breaches. One of the most effective ways to prevent criminals from accessing and compromising confidential company information is to implement an effective information security plan and properly train firm employees accessing the system. Additionally, companies should implement a dynamic and independent third party auditor to frequently test the adequacy of their security system. Lastly, key responsibilities within the information security chain should be segregated and rotated frequently. If companies follow these three basic tenets, they will be one step closer to the effective security of their information. Threats to Information Systems: Information security threats come in many different forms. Some of the most common threats today are software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information infiltration Some of the most prevalent types of data infiltration include input manipulation, program manipulation, data input manipulation, data stealing, and outright sabotage. The most frequent type associated with this form of fraud is manipulation of the data. The reason for this most common is because the criminal requires the less amount of skill. Most people have experienced software attacks of some sort. Viruses, worms, phishing
  • 2. attacks, and Trojan horses are a few common examples of software attacks. Governments, military, corporations, financial institutions, hospitals and private businesses amass a great deal of confidential information about their employees, customers, products, research and financial status. Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers. Implementing a Information Security System: With so many different ways and so much potential for breaches to information security systems, companies must establish a control system to strengthen the security of its information. There are seven basic tenets that help strengthen the security of company information systems. The following seven procedures are imperative to establishing an effective information security system: 1. Educating employees 2. Establishing quality internal controls 3. Establishing a board of directors and its appointees 4. Establishing a compliant system 5. Establishing an independent audit of the system 6. Developing a structure of accountability 7. Establishing a budget for the information security system; The Future of Information Security: The days of “basic firewalls” and basic detection systems to secure information are over. Viruses, manipulation of data, phishing scams, and even Trojan Horses are just some of the threats facing information security systems today. In spite of the financial restrictions facing companies in the present economic environment, information security is not the place that leaves room to cut corners. Information is one of a company's most precise assets. Security threats of information systems can have adverse effects on the reputation, status, and overall viability of a business. Therefore, companies must ensure that they implement an information security system that is accountable, verifiable, and as dynamic as the business environment in which they seek a competitive advantage. Those companies abandon the security of their information will inevitably find themselves at a decided disadvantage to their competitors.