Tuesday, September 24, 2019
W5Security Essay Example | Topics and Well Written Essays - 1250 words
W5Security - Essay Example Modern technology poses a threat in terms of ease of access to data and information which is exchanged over the Internet, which can compromise the privacy of both individuals as well as confidential information pertaining to business activities (Laudon & Laudon, 1999). Privacy is the freedom individuals have to be left alone both at home and at work, free from observation or intrusion by other individuals or the State, or in the case of organizations, from the State and unauthorized sources. Information technology and systems threaten individual rights to privacy by making the intrusion into privacy inexpensive, cost-effective, and efficient (Laudon & Laudon, 1999). Organizational information security strategies, measures, and standards are entirely significant reflections. An organization must take care to devise and put into practice a successful information safety plan, that can cover every phase of available information. Each category of such information safety serves a diverse function. The W5-Data Security Policy incorporates the following main points regarding the organizational data (W5-data security Policy, 2009) Security risk: Consumer based applications such as Internet sales and call center programs pose a security risk to data at its collection point, because they can be tapped by unauthorized sources.(www.protegrity.com). The data and information security risk can be illustrated as the intensity of its effect on organization activities (including operational jobs, illustrations, or status), organization assets, or on individual and/or financial information collected during the process of entering into business information arrangements. The security of data may also be compromised during the process of its use, such as for example through actual theft or hacking into data as well as insider theft, all of which pose a hazard (Rebecca, 2007). The above section has presented the possible hazards in a business situation. Such
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.