• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The role of IT Security in a corporation

Extracts from this document...


        IT Security Management

The role of IT Security in a corporation is to protect against unauthorised access which may result is data loss and manipulation. Defending assets by protecting them against system failure is also vital, along with protecting storage of data and protecting the corporation against accidents.

The role of IT Security Management is to lead, guide and shape an organisation in the area of security whether it’s physical security, network security, communicational security, operational security and information security. An IT manager will have to manage all the IT Security within a corporation within the constraints set by the corporation itself and advise them on

...read more.


the UK government lost 25 million child benefit records from 2 cd’s that were sent unrecorded using the courier TNT. The corporation failed to comply with the Data Protection Act 1998 as precautions were not taken to keep the data secured which criticised the government about the protection of data and undermined their reputation in data protection.

There are many different reasons why corporations comply with laws and regulations. This might be for mandatory reasons as stated in statutory law. As a corporation which complies with the Data Protection Act is in theory under the law taking precautions and following the law to keep their clients data safe. This

...read more.


Corporations also have polices and regulations which must be followed by the employees such as Richer Sounds PLC who state in their company policy that employees do’s and do not’s for example “never sending chain messages” – Richer Sounds PLC (http://www.richerstudentzone.co.uk/gcseweb/Unit2/2_4a.htm#agree).

Additionally prevention is also a key part of the role of IT Security Management, preventing the disclosure of information to unauthorised individuals, groups or systems. Integrity is likewise a key aspect, data should not be modified except if permission is granted and the user is authorised to do it. Not forgetting availability which links in with the point that data should be available to authorised users when they need it.

...read more.

This student written piece of work is one of many that can be found in our University Degree Information Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Information Systems essays

  1. Defining the scope of the Information Security Management System (ISMS) in a company

    are based, threats such as these are rare and should be based upon the history of the area in which the premises are located, if near a river then floods could be likely and computers and printers should be placed above the ground floor.

  2. Systems Life Cycle. The main disadvantage of the traditional waterfall method is with the ...

    6.7.5 Menu - Output This is the menu for the Whole Earth Restaurant which should be produced from the MenuItem table. 6.7.6 Purchase Order - Output The Purchase Order is an essential output document necessary to make an order for Menu Ingredients. In many cases this document will be automated.

  1. The purpose of this paper is to provide an analysis of Cisco Systems primary ...

    Threat of Substitute Products and Services A substitute is a replacement or alternative to doing business with the strategic business unit. The largest threat Cisco faces from substitute products is actually from Cisco products, used that is. Used Cisco equipment is auctioned off by online companies like E-bay.

  2. Network Proposal. Androsia Superior Fabrics has solicited the services of ML-DD IT Consultants ...

    switch for this network, as it maximizes productivity and investment protection by enabling a unified network for data, voice, and video. The topology that will be used for the network is a star and extended star. It is considered reliable because if one connection fails, it doesn't affect others.

  1. This research is about Management of network operating system at Natural Forest Resources management ...

    ABBREVIATIONS AND ACRONYMS LAN Local Area Network DBMS Database Management System IT Information Technology NAFRAC Natural Forest Resources Management and Agro-forestry Centre NOS Network Operating System OS Operating System MNRT Ministry of Natural Resources and Tourism HASHI Hifadhi Ardhi Shinyanga ICRAF International Centre for Research in Agroforestry GUI Graphic User

  2. The intention of this study is to analyze and explore the emerging field of ...

    Shared processing power aims to provide users with smaller computation times. This was also a prime factor in the emergence of grid technology as many scientific problems require extremely high processing speeds in order to operate upon data generated thousand of times per second.

  1. Types of IT Security Threats

    If this is done repeatedly, the resource allocation of the victim becomes so considerable that performance is soon adversely affected. This method of attacking, also known as flooding, poses various other types of threat. For example, an attacker could use such a method to flood a switch.

  2. Internet Privacy and Security

    These types of scams are more common through email lists being sold but are now starting to show up more and more on networking sites. Hacking is a common and almost everyday occurrence in cyber world. A hacker is defined as someone who can ?hack? their way thought the security levels of a computer or network system.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work