Computer Science
American College Information Security Issues Faced By Organizations Essay

American College of California

Question Description

I’m trying to study for my Computer Science course and I need some help to understand this question.

Write a paper in which you discuss information security issues faced by organizations and describe in detail a minimum of five specific threats to information assets.

The requirements for the assignment are as follows:
* The paper should include a minimum of five peer-reviewed scholarly references published since 2015

* 4 APA References

* The paper should be a minimum of 2000 words

* No Plagiarism Please

Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Attached.

Information Security Issues Faced By Organizations Outline
A. Introduction
Many organizations ensure that confidential information about the company and the marketing
strategies remain do not land in the hand of unauthorized persons. However, there are a lot of
security issues that have seen many organizations lose information into the hand of unauthorized
persons. This can be due to the vulnerability that is in the information systems of the company
that makes it easy for people to get access to the information (Albadrany & Saif, 2018). On the
other hand, it can be the works of the hackers or cyber criminals who work and force their access
into the organizations' information system. For proper information security, organizations have
to manage and mitigate the various threats to their information system. Organizations have to
prevent unauthorized access to their information assets and update their software to the current
versions. This essay will focus on the information security issues faced by organizations and
various threats that organizations face to their information assets.
B. Information security issues Security faced by organizations
I.
II.

Unauthorized access to the information system
Misuse of information system

III.

Data loss

IV.

Neglect of proper configuration

C. Threats to Information Assets
I.

Spam

II.

Malware

III.

Viruses

IV.

Social media attacks

V.
VI.
VII.

Outdated security software
Social engineering
Third party entry

D. Conclusion
Many organizations face information security issues and threats to their information
assets. Unauthorized access to information systems is a serious and prevalent threat that
is faced by many organizations. Also, there is an improper configuration of the users'
access to the systems. All these issues can lead to loss of data, which affects the
functioning process of organizations. Vulnerable information assets in organizations do
faces a lot of threats, such as attacks by spammers, viruses, and malware. These attacks
make the machines in organizations to stop working. Once an asset within an
organization is affected, the whole system can be changed since attacks do target the
entire operations. Social media attacks are also a common threat as hackers use social
media to gain access to the organizations' information systems. To ensure that all these
threats are curbed, an organization must have updated software. The updated software
can detect malware and any malpractices imposed on them.


Running head: INFORMATION SECURITY ISSUES FACED BY ORGANIZATIONS

Information Security Issues Faced By Organizations
Student’s Name
Institutional Affiliation

INFORMATION SECURITY ISSUES FACED BY ORGANIZATIONS

2

Information Security Issues Faced By Organizations
Introduction
Many organizations ensure that confidential information about the company and the
marketing strategies remain do not land in the hand of unauthorized persons. However, there are
a lot of security issues that have seen many organizations lose information into the hand of
unauthorized persons. This can be due to the vulnerability that is in the information systems of
the company that makes it easy for people to get access to the information (Albadrany & Saif,
2018). On the other hand, it can be the works of the hackers or cyber criminals who work and
force their access into the organizations' informat...

peachblack (35758)
Purdue University

Anonymous
The tutor managed to follow the requirements for my assignment and helped me understand the concepts on it.

Anonymous
The tutor was knowledgeable, will be using the service again.

Anonymous
Awesome quality of the tutor. They were helpful and accommodating given my needs.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4