Sign In
Not register? Register Now!
Essay Available:
You are here: HomeEssayIT & Computer Science
Pages:
2 pages/≈550 words
Sources:
3 Sources
Level:
MLA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

Computer Science: Security Standards Of Online Business (Essay Sample)

Instructions:

Research on The new model in information security that raises the Security Standards Of Online Business.

source..
Content:
Name
Professor
Course
Date
Security Standards
Introduction
The business world is experiencing numerous costs and these costs continue to augment due to poor maintenance of company information. Companies have to possess stable systems in order to avert loss or theft of imperative firm information. Moving business to online mode offers substantial pressure to companies thus necessitating companies to tackle security matter at all levels; from lawful, operational and conformity sides.
Utilization of international standards guarantee safeguard of the information to some extent, since it never offers firms the methodologies and details that are involved in undertaking certain processes. This implies that firms are aware of the harmful actions that can lead to theft or loss, although they lack adequate knowledge on ways to curb or deal with certain security problems.
In undertaking risk assessments, only the merits and definition of various elements concerning the process are presented while the standard never offers how the process can be undertaken in practicality (Myler & Broadbent 44). Additionally, the standard never provides the expected results, which can be utilized to determine the quality that the process achieves.
The standard asserts that workers ought to pursue security procedures and offers a prologue to training activities regarding security matters. Nevertheless, the standard never offers ways in which users must be edified or stimulated to practice these procedures (Siponen 98). Undertaking trainings cannot guarantee that employees will pursue the presented procedures. In the establishment of security policies, the standard lacks information on ways to create systems that cannot be easily breached (Siponen 98). Additionally, it only mentions that the management must build up their security policies for every information asset. Tackling physical threat is an imperative standard to safeguard company information although the standard never offers comprehensive technique to deal with security matters.
Information Security Metrics
The new model in information security considers the diversity in configuration settings that are present for definite security specifications. According to the model, utilization of certain settings and standards may hamper security interoperability especially in heterogeneous environments (Tan, Poslad & Titkov 353). Universal security cannot be deliberated prior to the creation of these standards and settings thus necessitating the process. Therefore, the new model seeks to alleviate these troubles through of reuse of various security specifications in different environments either heterogeneous or homogenous (Tan, Poslad & Titkov 353). Additionally, dynamic approach for the configuration and supervision of security that allow operation in heterogeneous domains comprising of heterogeneous stakeholders is required, necessitating the creation of the new model.
The present security specifications are unable to offer complete security resolution. Lacks of universal techniques for configuring consistent peripheral security configurations have considerably influenced the development of dynamic models. Current models exhibit difficulties in agreeing on certain configurations due to manifold settings. Current models as assumed to be imperfect, considering the technologies that they utilize. Utilization of HTTPS architectures has the possibility of becoming delicate, consid...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Internet Protections: Types Of Firewalls And Their Applications
    Description: Kinds of firewalls and their applications, companies that sell firewalls and their various costs. Firewall can be defined as a software or hardware system that protects a computer network from access by unauthorized internet users....
    1 page/≈275 words| 6 Sources | MLA | IT & Computer Science | Essay |
  • Two Scenarios Of False Information And Destroying Computer Evidences
    Description: The worst thing is that the SEC is claiming that the company did the backdating of the documents deliberately. Therefore, this is a serious offense....
    2 pages/≈550 words| 1 Source | MLA | IT & Computer Science | Essay |
  • User Interfaces for Visually Impaired People
    Description: Certain aspects associated with spoken language dialogue systems and user interfaces created for blind people are provided within the essay...
    7 pages/≈1925 words| 15 Sources | MLA | IT & Computer Science | Essay |
Need a Custom Essay Written?
First time 15% Discount!