• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The role of IT Security in a corporation

Extracts from this document...

Introduction

        IT Security Management

The role of IT Security in a corporation is to protect against unauthorised access which may result is data loss and manipulation. Defending assets by protecting them against system failure is also vital, along with protecting storage of data and protecting the corporation against accidents.

The role of IT Security Management is to lead, guide and shape an organisation in the area of security whether it’s physical security, network security, communicational security, operational security and information security. An IT manager will have to manage all the IT Security within a corporation within the constraints set by the corporation itself and advise them on

...read more.

Middle

the UK government lost 25 million child benefit records from 2 cd’s that were sent unrecorded using the courier TNT. The corporation failed to comply with the Data Protection Act 1998 as precautions were not taken to keep the data secured which criticised the government about the protection of data and undermined their reputation in data protection.

There are many different reasons why corporations comply with laws and regulations. This might be for mandatory reasons as stated in statutory law. As a corporation which complies with the Data Protection Act is in theory under the law taking precautions and following the law to keep their clients data safe. This

...read more.

Conclusion

Corporations also have polices and regulations which must be followed by the employees such as Richer Sounds PLC who state in their company policy that employees do’s and do not’s for example “never sending chain messages” – Richer Sounds PLC (http://www.richerstudentzone.co.uk/gcseweb/Unit2/2_4a.htm#agree).

Additionally prevention is also a key part of the role of IT Security Management, preventing the disclosure of information to unauthorised individuals, groups or systems. Integrity is likewise a key aspect, data should not be modified except if permission is granted and the user is authorised to do it. Not forgetting availability which links in with the point that data should be available to authorised users when they need it.

...read more.

This student written piece of work is one of many that can be found in our University Degree Information Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Information Systems essays

  1. Defining the scope of the Information Security Management System (ISMS) in a company

    are based, threats such as these are rare and should be based upon the history of the area in which the premises are located, if near a river then floods could be likely and computers and printers should be placed above the ground floor.

  2. This research is about Management of network operating system at Natural Forest Resources management ...

    Sure, the argument of the Linux desktop not being as widely used is a factor as to why there are no viruses. My rebuttal is that the Linux operating system is open source and if there were a widespread

  1. Systems Life Cycle. The main disadvantage of the traditional waterfall method is with the ...

    6.7.5 Menu - Output This is the menu for the Whole Earth Restaurant which should be produced from the MenuItem table. 6.7.6 Purchase Order - Output The Purchase Order is an essential output document necessary to make an order for Menu Ingredients. In many cases this document will be automated.

  2. The purpose of this paper is to provide an analysis of Cisco Systems primary ...

    small and medium businesses, service provider and recently added, home and home office. Products and end to end solution advice is given dependent on the customer's needs and size. Cisco is a global company with the majority of Cisco's sales, 56% made in the Americas followed by 27% in Europe, 7% in Asia Pacific and the remaining in various countries.

  1. computer security and Legal issues

    And sometimes they can get damaged deliberately by someone who wants to harm an organisation. Task 2 'Top 5' threats Top 5 list of current threats to security of data Hackers I ranked this threat as no. 1, because it is the most serious threat to computers.

  2. Knowledge Management

    Concerns The concern's that the IT professional that Alavi and Leidner (1999) interviewed were primarily over the cultural, managerial and information issues. Such issues included: change management concerns, sharing information barriers between business units and individuals, how to measure Knowledge Management effectiveness and implementation concerns.

  1. Network Proposal. Androsia Superior Fabrics has solicited the services of ML-DD IT Consultants ...

    LAN At all the branch offices the computer network components will include the use of a server, a switch, and a router for the office. The selected Network Operating System(NOS) is Windows Server 2008. In choosing this operating system, it will provide great conveniences for the installation, configuration, and maintenance of the network.

  2. Organisational Information Systems. In this assignment I have chosen the accounting department, I ...

    is no longer appropriate and the company may need to invest in a totally different software, as some time the size of a organization may increase this would mean more data/figures, so the organisation may have to invest in a software that can cope with this data because the current software can?t handle the data load.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work