.

Wednesday, April 17, 2019

Information Security Small Businesses Research Paper

Information Security Small Businesses - Research Paper ExampleTherefore, the protection of education and selective information should be prioritized as one of the foremost steps in every organization, whether small or large. Identity theft and credit badger frauds are aggravating crimes that are witnessed due to criminal acts of data thefts. Organizations around the world tend to suffer such(prenominal) thefts that jeopardize their reputation, and often face lawsuits from their clients. One such resultant was witnessed last year with Sony PlayStation when their PlayStation network in the British division faced data theft. The shielder (2011) reported that around 77 million users data was stolen. The stolen information included names, addresses, date of births, passwords and credit card numbers. The data thefts of such nature are likely to cause credit card frauds and bank frauds firearm attempting identity thefts. The online games service had to remain shut down for a week since they did not want the incident to recur before appropriate measures were taken to combat the bam. Richmond Williams (2011) verbalize that such an enormous attack was likely to damage the reputation of Sony and threaten its capability to compete with other giant competitors such as Apple, Google, etc. It is similarly vital to ensure that information security measures are updated regularly to stop either intruder from taking advantage of whatsoever obsolete protection software (which is often noticed in small organizations). Alongside financial losses and reputation damages, in powerful information security measures are similarly likely to instigate legal actions and investigations against organizations. With reference to the example under discussion, a lawsuit was filed against Sony for not providing abounding security to the data of their customers. The customers wanted compensation from Sony for the damages caused by the data theft at Sony. Jones (2011) stated that the resp ective company was likely to face as much as ?500,000 of fine for not organism able to protect their customers sensitive information. With the comprehension of the consequences of not implementing effective security measures, it is also most-valuable to understand the different types of vulnerabilities that exist in organizations. Confidentiality of data implies the safe keeping of data against any revelation without the approval of the owner of the information. The revelation of data might not be intentional by the organization however, the data flow that is implemented for the transfer of the data might involve some unreliable third parties that might take advantage of such exposure of data. Data integrity implies that no dislodge or corruption should happen to the data such corruption and changes are likely to occur if effective information access procedures are not implemented. Availability of data refers to the presence of data and service upon the guide of the customer and employees cyber attacks on an organization can make an online service go offline or delete important data by adopting different types of intrusions and virus attacks etc. Authenticity and non-repudiation are interrelated concepts that involve the consequence of identity of the interacting parties. Authenticity implies that the interacting

No comments:

Post a Comment