• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The role of IT Security in a corporation

Extracts from this document...

Introduction

        IT Security Management

The role of IT Security in a corporation is to protect against unauthorised access which may result is data loss and manipulation. Defending assets by protecting them against system failure is also vital, along with protecting storage of data and protecting the corporation against accidents.

The role of IT Security Management is to lead, guide and shape an organisation in the area of security whether it’s physical security, network security, communicational security, operational security and information security. An IT manager will have to manage all the IT Security within a corporation within the constraints set by the corporation itself and advise them on

...read more.

Middle

the UK government lost 25 million child benefit records from 2 cd’s that were sent unrecorded using the courier TNT. The corporation failed to comply with the Data Protection Act 1998 as precautions were not taken to keep the data secured which criticised the government about the protection of data and undermined their reputation in data protection.

There are many different reasons why corporations comply with laws and regulations. This might be for mandatory reasons as stated in statutory law. As a corporation which complies with the Data Protection Act is in theory under the law taking precautions and following the law to keep their clients data safe. This

...read more.

Conclusion

Corporations also have polices and regulations which must be followed by the employees such as Richer Sounds PLC who state in their company policy that employees do’s and do not’s for example “never sending chain messages” – Richer Sounds PLC (http://www.richerstudentzone.co.uk/gcseweb/Unit2/2_4a.htm#agree).

Additionally prevention is also a key part of the role of IT Security Management, preventing the disclosure of information to unauthorised individuals, groups or systems. Integrity is likewise a key aspect, data should not be modified except if permission is granted and the user is authorised to do it. Not forgetting availability which links in with the point that data should be available to authorised users when they need it.

...read more.

This student written piece of work is one of many that can be found in our University Degree Information Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Information Systems essays

  1. Defining the scope of the Information Security Management System (ISMS) in a company

    are based, threats such as these are rare and should be based upon the history of the area in which the premises are located, if near a river then floods could be likely and computers and printers should be placed above the ground floor.

  2. This research is about Management of network operating system at Natural Forest Resources management ...

    Sure, the argument of the Linux desktop not being as widely used is a factor as to why there are no viruses. My rebuttal is that the Linux operating system is open source and if there were a widespread

  1. Systems Life Cycle. The main disadvantage of the traditional waterfall method is with the ...

    The products entered are put into the 'IngredientStock' table with the qty field default to 0. Each product will have a minimum amount set, so that when the stock reaches below that level it can be added to the purchase order report.

  2. The purpose of this paper is to provide an analysis of Cisco Systems primary ...

    small and medium businesses, service provider and recently added, home and home office. Products and end to end solution advice is given dependent on the customer's needs and size. Cisco is a global company with the majority of Cisco's sales, 56% made in the Americas followed by 27% in Europe, 7% in Asia Pacific and the remaining in various countries.

  1. Network Proposal. Androsia Superior Fabrics has solicited the services of ML-DD IT Consultants ...

    Whereas, if a server goes down at one location; that location can remain active by utilizing the resources of any of the other servers. Furthermore, due to the company's relatively small size and the server's versatility, single servers can accomplish multiple server roles in the virtual environment.

  2. Creating a shopping website with Project management

    be needed * Links need to be more clear - linking in with colour scheme OLD WEBSITE NEW WEBSITE The screen design below is the design the group will use for our website. The group have changed our screen designs so that is user friendly with the goals of the HCI which stands for Human-computer interaction.

  1. BIM and Facility Management

    The head of the subdivision receives the WICI and decides if the WICI is valid. When the WICI is confirmed and accepted, the head of the sub department will give the work order to his employee. When the WICI is done / solved the manager or employee can change the

  2. Organisational Information Systems. In this assignment I have chosen the accounting department, I ...

    is no longer appropriate and the company may need to invest in a totally different software, as some time the size of a organization may increase this would mean more data/figures, so the organisation may have to invest in a software that can cope with this data because the current software can?t handle the data load.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work