Case Overview of Security Issues

Qualified Writers
Rated 4.9/5 based on 2480 reviews

100% Plagiarism Free & Custom Written - Tailored to Your Instructions

Case Overview of Security Issues


Module 1 - Case


Assignment Overview

According to Pesante (2008) there are three basic security concepts that are important to information on the Internet. Those are: confidentiality, integrity, and availability. In addition, she indicates that there are three additional concepts relating to the people who use information which are authentication, authorization, and nonrepudiation. Please read the full article that explains these concepts.

Pesante, L. (2008). Introduction to Information Security. Retrieved from the World Wide Web on 05/20/09 from

Solutions to achieve information security are multi-faceted and require collaborations from multi-parties. It is not easy to assure information security, such as in the dimensions mentioned above. The following article broadens one`s views on security. Even though it focuses on the protection of infrastructure, one can learn from its methods of approaching security to solve other kind of security problems. It is a long article. You don`t need to read word-by-word. Please focus on the key concepts.

White House. (2009). Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure. White House.

The following essays are much shorter and easier to read. They offer different perspectives and especially with unique views on the role of the government.

Schneier, B. (2012), The Big Idea: Bruce Schneier. February 2012.

Gonsalves, A. (2012), RSA 2012: Three Greatest (and Surprising) Internet Security Dangers, CRN.

Case Assignment

Prepare a 3- to 4-page paper addressing the question:

"How to Achieve Business Information Security in Cyperspace?"

Assignment Expectations

Use information from the modular background and case readings as well as any good quality resource you can find. Please cite all sources and provide a reference list at the end of your paper.

The following items will be assessed in particular:

Your ability to consolidate ideas from reading materials.

Your demonstration of your understanding of various dimensions of IT securities and available IT security solutions.

Your ability to apply your understanding in national security policy in cyberspace to a business or an organization.


Module1- Case Overview of Security Issues Name Institution Module1- Case Overview of Security Issues The Internet is a collection of millions of computers in a lightly interconnected networks that are accessible to individual computer users. This means that the internet or cyberspace offers the convenience and easy access of information. However, with this convenience also comes various security risks when dealing with virtual information. Among these risks is the danger of information being stolen, altered, or even misused. However, there are things that businesses can do to achieve information security in cyberspace (Pesante, 2008). First, it is crucial for businesses or firms to train their employees on the risks and security principles. Employees remain the initial line of defense when there is risk of malicious activities on their work computers. The idea is to ensure that they understand basic security principles and standards such as the need for strong passwords. The firm need to est


Price: £99

100% Plagiarism Free & Custom Written - Tailored to Your Instructions