Thursday, June 13, 2019
Considering the Most Comprehensive Method of Handling Information Research Paper
Considering the Most Comprehensive Method of Handling Information Security - Research Paper Examplethither are numerous businesses today that place most of their information in computer systems. Hospitals, the military, the government and many other small enterprises use them. This information could be detrimental to the company if it was accessed by the public hence the need for information security. It is quite common to find that certain businesses usually have the names of their employees, their salaries, patois account details in their computer systems. On top of this, one may find that other firms place their client details, sales information and market information in their database. In the howevert that some of this information is lost, destroyed or compromised in any way, then the given company will be hampered from going about their daily operations. It should be noted that software protection through virus protection or through the imposition of firewalls alone cannot b e enough to solve the information security problem. There should be set procedures and systems within any one given organisation that will facilitate the butt of efficient data protection. Information systems are distributed in three main parts. These are software, hardware and communications. This implies that any sort of information security systems must be applied in the three realms. It must also be made in such a way that it cuts across the physical, organisational and the personal. Procedures and policies normally used for these systems are those ones that apply to computer operators, users and administrators. It should be noted that information security applies to all types of data it may be electronic data, print data or even other forms. Because of the wide aspect of information security, it has now become a career field on its own.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.