Threats to Information Security

How This Custom Writing Service Works

1. Place your order

Provide all instructions about the type of paper, length, deadline and pay.

2. Thorough research

Our team of professional writers conduct in-depth research on the topic to extract information from relevant sources.

3. Writing and proofreading

The experienced writers knit together all ideas into an original paper. Our editors go through the paper to correct any errors.

4. Product Delivery

You get your completed paper in your email. In case you need any corrections, we do ammendments free of charge.

Step 1 of 2

  • Price: $0.00

Why Buy Dissertations from us?

100% Original writing

No plagiarism. Original content written from scratch just for you. and custom free plagiarism report

Affordable writing service

Get your paper at a cheaper price than our competitors. Save money.

Timely delivery of orders

Never miss your submission deadlines again. We keep time & help you smile.

24/7 Customer support

Contact customer support or your writer any time for updates, drafts, etc. Call, Text, Whatsapp.

100% Private & Confidential

Your connection is private, your personal & payment information is secure

Need help placing your order?

Let nothing stop you from enjoying the best writing services. Save your time and focus on other aspects of your studies as professional writers work on your paper.
Affordable

Threats to Information Security

Threats to Information Security

            Introduction

The increase in cybercrime has prompted many companies to come up with ways of securing their data. In not doing so, may result in vital data landing into the hands of corrupt individuals who may exploit them to their benefits. The purpose of writing this paper is to discuss some of the numerous threats information security faces. In doing this, we are going to answer some of the questions such as: why is information security an important issue? ; What are the sources of information threats (human, nature, and technology factors)? Information will be obtained from various assigned materials. As a result, we will understand the risks to information and see some of the ways of curbing them.

Importance of Information Security

Information that is important to an individual or an organization should be well taken care of to make sure that the rights of the persons are respected through their private data not being accessed without authorization. According to Pesante (2008), information stored electronically is more vulnerable than its counterpart which is contained in printed papers and locked in a cabinet. She goes ahead to state that there are fundamental security concepts to storing data on the internet, which is availability, integrity, and confidentiality. Therefore, only the right person should have entry to the details contained on the internet to avoid being sued.

Loss of confidentiality happens when someone copies or reads data they are not authorized to access. Pesante (2008), pointed out that privacy is a crucial attribute when it comes to some types of information. Examples include insurance and medical records, corporate investment strategies, research data, and new products specifications. In other cases, there may be a legal obligation for the company to safeguard the privacy of individuals. This is probably true for debt collectors; hospital records and medical testing laboratories; banks; and agencies that provide counseling services. Consequently, if such information is accessed by an unauthorized individual, there may be a legal liability which could result in the company losing a lot of money in damages.

Information security should be maintained to prevent data from losing integrity through modification in unexpected ways. According to Pesante (2008), the unauthorized alteration could either be intentional or by human error. Activities such as financial accounting, air traffic control, and electronic funds transfer are an example of tasks whose data cannot afford to be compromised. If such a thing happens, an individual may lose money by transferring it to the wrong person, and a change in air traffic controls by a terrorist could result in plane crashes.

Information security is also essential since data can even be erased entirely making it unavailable. As a result, information cannot be accessed when needed by those approved to do so. Businesses that deal with the online inventory system and airline schedules are an example of companies that depend on the availability of information when it is needed. Loss of availability of information may lead to waste of time in recovering from the problem which could result in a decrease in productivity (Pesante, 2008).  Care should be observed to ensure data is always made available when it is needed to prevent things such as loss of staff hours due to businesses coming to a standstill.

Cyber threats continuously put our federal systems at risk due to the vital information and dockets they control. According to United States Government Accountability Office (2009), cyber threats to cyber-based essential infrastructure and federal information system keeps on growing and evolving. With the advancement in computer technology, various agencies are becoming more reliant on the computerized based information system to carry out its numerous operations and also to store data. Due to this fact, care needs to be taken by the federal agencies to preserve the accountability, integrity, and confidentiality of their various information system. Failure to do so could lead to many things such as federal payments being stolen, critical operations being disrupted such as those supporting emergency services and national defenses, and attacks could be launched on other computer systems through computer resources (United States Government Accountability Office, 2009). Consequently, policies should be adopted to make sure entry is not granted to wrong people.

Intellectual Property (IP) which ranges from trade secrets such countries where a patent is registered, the chemical formula for the product or dates for product launch are more valuable than any physical assets the company possess. According to Behr and Slater (2012), Intellectual Property Commission have shown that IP theft costs companies in the USA yearly to the tune of 600 billion dollars. Henceforth, denying the rightful owners a vast amount of revenue.

Sources of Information Threat

Information threat can be categories according to human, nature and technological factors.

Human

Human beings can prove to be a threat to information either intentionally or unintentional. According to Behr and Slater (2012), an example of a situation of an individual deliberately becoming a threat to report is an engineer who often had lunch with his previous boss who currently works for a rival firm kept revealing the competitive secrets of his company. In a span of 14 months, the information ended up costing his employer to lose three prime deals.

Employees may also give out some secrets of the company without intending to do so. Scientists who were from Eastern Europe and were working on the defense in America got an invitation to serve as consultants or address people at a seminar (Behr and Slater, 2012). As scientists, this call appealed to them as they wanted to share information with their peer’s about their work. In doing so, their country gathered information which would have been expensive if they had researched.

Combating the threat of human to information involves a variety of measures being put in place. Rooms housing sensitive data should be well locked, and the number of workers accessing it should be limited. Educating employees on the importance of preventing IP leaks can prove to be important in protecting information. According to Sasser (2010), installing anti-phishing software can help in identifying suspicious content that gets integrated into our email clients and web browsers. Two-factor authentication also helps to prevent fraudsters from using bank cards since one requires the card plus a PIN number to access it. Physical security helps to reduce the risk of an unauthorized person accessing data; this is through locating the facility in a secure location, putting deterrence and delay by erecting high fences and also hiring guards (Infosec Institute, 2012).

Technological Factors

When technology is put to good use, it leads to prosperity and success in the country, but if not taken good care of, it can be disastrous. An example is a cyber-attack aimed at the city water utility based in Illinois which destroyed a pump. The attacks took place over a series of months where they powered the system on and off severally burning out the water pump this was done by taking control of the Supervisory Control and Data Acquisition system (SCADA) network ( Krebs, 2011). From this, we can see that if the technology is not monitored carefully, it can lead to other areas shutting down.

Another way through which technology can affect information is through software failure. According to Perrow (2008), 75% of crashes that occurred in 2005 was as a result of software failure. The software errors come about as a result of a faulty code, operator error, specification errors, and also due to management and organizational problems. Such failures have disrupted financial activities, hospital, communication systems, and airports. Therefore effort should be taken to create proper codes and educate people on the various methods and specification put by the manufactures on their products.

Nature

Human beings are not involved in any manner in environmental factors affecting informational technology. Jouini et al. (2014), states that natural disasters such as floods, lightning, earthquakes, animals, and wildlife interference hurt the information systems. Floods can destroy systems holding information making them inaccessible. Shock can ruin communication infrastructure making it impossible to access data through the internet. It is hard to control these factors since most of them are beyond our scope. However, measures should be put in place to come up with backups in case we face such tragedies.

Conclusion

From the article, we have seen how vital information systems are. If not protected and safeguarded thoroughly, unauthorized people may manipulate them to their benefits, a business may incur losses, and accidents may occur due to technological errors. Therefore, appropriate infrastructure has to be put in place to prevent such things from happening.

References

Institute, I. (2012, December 18). Physical Security: Managing Intruder. Retrieved October 10, 2017, from INFOSEC INSTITUTE: resource.infosecinstitute.com/physical-security-managing-intruder/

Jouini, M., Rabai, L. B., & Aissa, A. B. (2014). Classification of security threats in information systems. In ScienceDirect (pp. 489-496).

Krebs, B. (2011, November 11). Cyber Intrusion Blamed for Hardware Failure at Water Utility. Retrieved October 28, 2017, from Krebs on Security: https://krebsonsecurity.com/2011/11/cyber-strike-on-city-water-system/

Office, U. S. (2009). Cyber Threats and Vulnerabilities Place Federal Systems at Risk. In INFORMATION SECURITY (pp. 2-10).

Perrow, C. (2008). Software Failures, Security, and Cyberattacks.

Pesante, L. (2008). Introduction to Information Security. Carnegie Mellon University.

Sasser, P. (2010). Anti-phishing software. Retrieved from articleworld.org: www.articleworld.org/Anti-phishing_software

Slater, A. B. (2017, September 6). Intellectual property protectio: The basics. Retrieved from CSO: https://www.csoonline.com/article/2138380/loss-prevention/loss-prevention-intellectual-property-protection-the-basics.html?page=1

Types of Academic Papers

Essay
Dissertation
Research Paper
Reaction Paper
Lab Report
Journal
Book Report
Book Review
Movie Review
Synthesis Paper
Review of the Literature
Research Proposal
Thesis Proposal
Dissertation Proposal
Annotated Bibliography
Article Critique
Term Paper
Case Study
Capstone Project
Artices
Presentation Design
Mathematical Problem
Mind Game
Tricky Questions

Dissertation Chapters

Dissertation Abstract

Dissertation Introduction

Dissertation Literature Review

Dissertation Methodology

Dissertation Results

Dissertation Discussion

best essay writing services

Types of Essays

Expository essay
Analytical essay
Persuasive essay
Narrative essay
Definition Essay
Descriptive essay
Process Essay
Personal essay
Admission essay
Compare and contrast essay
Cause and effect essay
Critical analysis essay

Order Your Custom Paper Now

Step 1 of 2

  • Price: $0.00

Acoustics
Agriculture
Anatomy
Animation
Anthropology
Archeology
Architecture
Artificial Intelligence
Arts
Astronomy
Biological Sciences
Biology
Business Management
Business Studies
Chemical Engineering
Chemistry
Civil Engineering
Communication
Computer Science
Construction

Consumer Science
Criminology
Cultural Studies
Design
Divinity
Earth Sciences
Economics
Education
Electrical Engineering
Engineering
English Language
Environment
Family
Fashion
Finance
Food Science
Forestry
Gender Studies
Geography
History

Human Resource Management
Journalism
Law
Library
Literature
Logic
Management
Marketing
Marketing
Mathematics
Mechanical Engineering
Media
Medicine
Military Sciences
Museum Studies
Music
Nursing
Nutrition

Philosophy
Physics
Political Science
Programming
Psychology
Public Administration
Religious Studies
Science
Social Work
Sociology
Software Engineering
Space Sciences
Sports
Statistics
Systems Science
Technology
Textiles
Theology
Transportation
Veterinary Medicine

Write My Dissertation offers top-notch customer support services. 

When working on your dissertation paper, expect to find us online via Live Chat 24/7/265. 

Our customer support agents are always ready to listen to you and deliver a quality dissertation.

Be free to contact the customer support team if you have any questions or comments.

How To Order PhD dissertation

Could you help me write my dissertation?

Yes. That’s our work to write a dissertation.

Use the green order form to order the entire dissertation.

Instead of pay someone randomly selected from the internet, it’s good to use a reputable company like WMD which specializes in dissertation services.

It’s now easy to buy academic papers online. You can phone place order, fill out the order form, pre order product and hire someone to write your paper just like that. Expect to get great work, just like many others have, for your first order and all others.

You’ll experience the best, get your order 100% unique and delivered in time (timely delivery).

Write my dissertation delivers custom writing services to customers from all states in the USA. Our services are provided in the English language. You can find the best custom dissertation services if you are from any of the following states or territories in the United States of America: 

Alabama, Alaska, American Samoa, Arizona, Arkansas, California, Colorado, Connecticut, Delaware, District of Columbia, Florida, Georgia, Guam, Hawaii, Idaho, Illinois, Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Minor Outlying Islands, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Jersey, New Mexico, New York, North Carolina, North Dakota, Northern Mariana Islands, Ohio, Oklahoma, Oregon, Pennsylvania, Puerto Rico, Rhode Island, South Carolina, South Dakota, Tennessee, Texas, U.S. Virgin Islands, Utah, Vermont, Virginia, Washington, West Virginia, Wisconsin, Wyoming

If you need dissertation writing help in the English language, then we’ve got you covered.

Our clients are mainly English speakers  from: Australia, New Zealand, United Kingdom, United States, Antigua and Barbuda, Bahamas, Barbados, Belize, Canada, Dominica, Federation of Saint Christopher and Nevis. Others include Fiji, Ghana, Grenada, Guyana, Ireland, Jamaica, Kenya, Liberia, Nigeria, Papua New Guinea, Saint Lucia, Saint Vincent and the Grenadines, Sierra Leone, Singapore, South Africa, Trinidad and Tobago.