SamplesExploratoryAn Information TechnologyBuy essay
← Driving under InfluenceAggression →

Custom An Information Technology Essay

Organizations have high level information policy that centers on how information is handled within the organization .As such; the refinement of such information is paramount with regard to automation and establishing an acceptable behavior over the information.  Tentatively, the refinement involves establishing essential policy oriented procedures.

An information security policy functions to establish issues concerning: integrity, availability concerns; information access; defining access decision (user characteristics) and authority issues as well. As such, it is a document that states, in writing, plans of an organization protecting the company’s physical and information technology assets (Ephraim 2004). Arguably, it is updated continuously as technology and employee requirements change.

The goal of these procedures is to protect, limit information to authorized personnel, protecting information modification from unauthorized individuals. Per se, Information security procedures are the systematic methods a company will use to implement the various techniques to put into enforce a given policy. The information security procedures aim at protecting the information and information systems of the company from unauthorized access.

On the other hand, information system standards are the various techniques which an organization will use to protect its information systems. Information protection is paramount as, access to a company’s high level information, would be granted to authorized personnel. This includes techniques like specifying how long a password should be, tentatively permitting the systems to easily detect a breach in the database.

Firewall

A firewall is software or hardware that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your computer, depending on your firewall settings. As such, the firewall is an entry point of the network system. It stands for intrusion detection system is software that inspects all network activity detects a network or computer system attack from someone attempting to compromise a system.

IPS

IPS means intrusion prevention system. This is a software that monitors the network or computer system for any suspicious activity and responds to them rapidly by reporting and blocking the activity.

Proxy server

A proxy server is a computer that functions as an intermediary between a web browser and the Internet. Proxy servers help improve web performance by storing a copy of frequently used web pages.

Honeypots

These are computer systems on the internet that are specially designed to attract and trap or counteract attempts of unauthorized use of information systems. Moreover, they provide attack warning and trends utilization of unwanted users during honeypot use.

Custom An Information Technology Essay

Code: Sample20

Related essays

  1. Aggression
  2. Logistics Design
  3. Driving under Influence
  4. Aerial Surveillance
On your first order you will receive 20% discount
Order now PRICES from $12.99/page ×
Live chat