Saturday, May 4, 2019
The role of Government in the Information Assurance and Security Research Paper
The role of Government in the Information Assurance and Security process and their addition to individualized training to include soc - Research Paper ExampleCyber criminals have continued to develop better and more(prenominal) sophisticated tools of accessing mysterious discipline of highly confidential governing body agencies, banks, credit bureaus and research institutes. This has increased to draw more pressure on the government as steps that ensure information assurance and confidentiality rises. With the ascent corporate competition, unauthorized access to the competitors strategic information can provide the requisite leeway for growth. This has seen companys loss private marketing and management ideas to their rivals through unauthorized access to private information. The government has a huge responsibility in the provision of information assurance and warranter measures to both its agencies and private companies. In the process of achieving this important goal, t he government accesses private and personal information of its citizens. This has created a major public outrage as they feel that their privacies have been invaded. Mobile phones, social media and emails are avenues for individuals to commuting either business or personal information. ... Introduction Background information of the study Information auspices is the continuous protection of information and security apparatuses from any unauthorized access, disruption, alteration, publication or even vector sum and disruption. Information assurance and security is about creating systems that promote a secure platform for storing information and information without the fear of unwanted intrusion. Information in todays world is a critical plus that must be prophylacticguarded at every(prenominal) costs. Unwanted access to private information can deal to loss of such important assets, which may cripple an organization. Competitive edge is the desire of every flowerpot in this co mpetitive world of business. Any organization that can easily access the others information regarding their future(a) operation plans can scheme to stifle such plans. Any step that threatens private and business information therefore threatens the existence of the business (Motorola Inc, 2010, p.4). Backstreet terrorism has been replaced with more advanced techniques that vary from cyber attacks, access to confidential security details online and attacks on bank information. Any lapse in the security system of technologically stored information translates into millions of shillings or thousands of lives lost. The main mandate of any government is to ensure that its citizens are protected at all times (Bowens and Keys, 2004). Adopting steps that ensure that no security lapse can occur within the government security details is of great importance. Attack on government dignitaries can be easier if terrorist access their private security details. It is therefore the sole role of the go vernment to ensure that confidential information is kept safe and secure from terrorist attacks (Cybercore
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.