Friday, October 18, 2019

Security Framework Research Paper Example | Topics and Well Written Essays - 1250 words

Security Framework - Research Paper Example Most computer network threats come from the internet and are done intentionally because people for malicious intentions develop them. The use of the ISO 27000 Series security framework is, therefore, an endeavor by individuals as well as organizations to protect their information and other digital assets from assaults from the internet. The measures stipulated in the ISO 27000 Series framework measures will involve various steps, the most important of these steps being an individual’s understanding of the different forms of cyber-attacks that they are likely to encounter (Ma, Schmidt and Pearson 58). Once one has knowledge of this, then it is his or her responsibility to ensure that they have put in place the best security system they can get their hands on. There exist diverse types of hazards and these can be regarded as to be of unstable levels and risks to an individual’s personal information in their computers. The higher the possibility of an attack, the more prog ressive the security system, that is to be put in place to ensure that the threat is minimized. The ISO 27000 security framework activities involve measures to prevent threats ranging from malicious codes, also known as malware and spyware, to computer viruses. Some of these viruses are so serious that they have the ability to erase entire operating systems of computers. These viruses also facilitate hackers to have right of entry to all the data stored in the infected computers, ensuring that they have access to information, which can be used for their own gain. It is necessary for individuals and companies to avoid such invasion into their computer systems by having the best security framework (Serrhini and Moussa 159). Measures taken involve the acquisition of antivirus software that is reliable, frequent checking of software to ensure that they are secure from attacks. The computer software should be updated frequently to assure they are working in full capacity. Thus, it vital for organizations to ensure all departments are conscious of their ISO 27000 security framework because it is not known when a threat is likely to be encountered. Borders have relevance in tackling information security, and looking at borders, domains of various countries interact because they do not have borders, therefore, the domains of a nation will be related to the nation’s willingness to assert sovereignty in the domains. With the detection of threats at the various nation states, it is possible to retain legitimate response actions by the state and this will be an important actor of the border in ensuring they continue being relevant. In cyber space, the territorial borders broadly define sovereignty of a specific nation irrespective of the domain and ability to locate domains physically. Despite the borders becoming insignificant when carrying out legal commerce, they are highly significant when carrying out policing actions of transnational threats. In China, there is a severe internet information security because there is a leakage of information and this requires protection of privacy and other personal data should be strengthened because internet abuse has become unscrupulous. Sufficient protection of private data in China is lacking and this is because of the existence of loopholes in the safety of public information because of ineffective management mechanism (Veiga and Eloff 361). The reasons behind mismanagement of public informa

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.