Monday, June 17, 2019

Security Framework Research Paper Example | Topics and Well Written Essays - 1250 words

Security Framework - Research Paper ExampleMost computer network threats come from the internet and ar done intentionally because people for malicious intentions develop them. The use of the ISO 27000 Series security framework is, therefore, an endeavor by individuals as well as organizations to hold dear their information and other digital assets from assaults from the internet. The measures stipulated in the ISO 27000 Series framework measures will take on various steps, the most important of these steps being an individuals understanding of the different forms of cyber-attacks that they are likely to encounter (Ma, Schmidt and Pearson 58). Once one has knowledge of this, then it is his or her responsibility to promise that they find put in place the best security system they can get their hands on. There exist diverse types of hazards and these can be regarded as to be of tottering levels and risks to an individuals personalized information in their computers. The higher th e possibility of an attack, the more progressive the security system, that is to be put in place to ensure that the threat is minimized. The ISO 27000 security framework activities involve measures to prevent threats ranging from malicious codes, also known as malware and spyware, to computer viruses. Some of these viruses are so serious that they ask the ability to erase entire operating systems of computers. These viruses also facilitate hackers to have right of entry to all the data stored in the infected computers, ensuring that they have rag to information, which can be used for their own gain. It is necessary for individuals and companies to avoid such invasion into their computer systems by having the best security framework (Serrhini and Moussa 159). Measures taken involve the acquisition of antivirus software that is reliable, frequent checking of software to ensure that they are secure from attacks. The computer software should be updated frequently to assure they are wo rking in full capacity. Thus, it vital for organizations to ensure all departments are conscious of their ISO 27000 security framework because it is not known when a threat is likely to be encountered. Borders have relevance in tackling information security, and looking at borders, domains of various countries interact because they do not have borders, therefore, the domains of a nation will be associate to the nations willingness to assert sovereignty in the domains. With the detection of threats at the various nation advances, it is possible to retain legitimate response actions by the state and this will be an important actor of the border in ensuring they continue being relevant. In cyber space, the territorial borders broadly define sovereignty of a particularized nation irrespective of the domain and ability to locate domains physically. Despite the borders becoming insignificant when carrying out legal commerce, they are highly significant when carrying out policing action s of transnational threats. In China, there is a severe internet information security because there is a leakage of information and this requires protection of privacy and other personal data should be strengthened because internet abuse has become unscrupulous. Sufficient protection of private data in China is lacking and this is because of the existence of loopholes in the safety of public information because of ineffective management mechanism (Veiga and Eloff 361). The reasons behind mismanagement of public informa

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.