Saturday, May 11, 2019
Technology Evaluation and Recommendation Research Paper - 2
Technology Evaluation and Recommendation - enquiry Paper ExampleInformation Security Project Plan There are umteen differences among physical guarantor, and information surety. Information security is concept that entangles most aspects of the society, majorly beca spend of the ubiquitous adoption of computing technology in the modern arena. In our daily lives, we use computers at work place for our employers, play on computers in homes, study online, do business, and check emails, and so on. The level of development in the modern world has greatly improved especially with the increased rate of innovation, and growing technology. Everyone in the modern world is impress at how the level of technology is increasing so fast because they benefit from it in very many different ways (Matford & Whitman, 2012). Owing to the fact that most people have the urge to make things easier in the modern world, everyone is turning towards the direction of Information technology because online s eems to be the hereafter of everyone, and everything. The web is viewed as the future of most activities in the world today since currently it serves as a very useful shaft even though it also has some intimidating proposition. Although technology enables more productivity and allows access to overmuch information, it also carries a lot of security issues. Employers preserve information some their companies, employees, and other(a) important documents on the computer systems. Banks also store vital information on money transaction between them, and other clients. One of the most common challenges in the modern technology world is hacking, and piracy. When someone hacks information about a company, then this leaves the company in danger of either breaking down or losing credibleness from the public that it serves because this interferes with its reputation, and competitors can take advantage of this situation. Employers can lose millions of dollars, and suffer damage of reputat ion, face sub judice prosecution through system configuration when hackers accesses soulally identifiable data. These issues are more common in the media, and they have disturbing regularity (Matford & Whitman, 2012). The rapid growth of technology brings many security issues, and this means that security standards need to be put in place with effective implementation. When discussing security issues, it is often helpful to use a model that has a baseline or foundation. This provides consistent concepts, and set of terminologies, which professionals can refer to when security issues arise. Information security has three primary concepts that are confidentiality, integrity, and availability triad since it focuses on security in relation to available data. Concept of confidentiality is similar but not the same as privacy. This component entails protect data from those who are unauthorized to view it. One of the best examples of implementation of concept of confidentiality is when a person goes to the ATM to withdraw money he or she is very keen on maintaining, and protecting the accounting system number, and card pin number. This is how simple concept of confidentiality operates (Matford & Whitman, 2012). This concept of information security goes flip in hand with that of physical security because the idea of confidentiality is still applicable in many ways. With the rapid expansion of ball-shaped networks through interconnecting information systems in the modern
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.