Running Head: INFORMATION SECURITY
Information Security Issues
Organizations and individuals now more than ever, heavily rely on information systems
and the internet for various daily activities and tasks. Information technology advancements
allow fast internet connections, which enhances business creativity, including that of the black
market than ever before. Information security threats and risks now evolve constantly and are
getting more complicated. A security threat can get defined as a malicious activity aiming at
stealing or corrupting organizational data while disrupting the entire organization or its systems
(Gupta et al., 2017). A security event, therefore, is an occurrence during which organizational
data, information, or network may get exposed or breached.
Information security events can result in incidents that involve network and data
breaches. An organization must always protect their networks and data resources and remain
vigilant, as cybersecurity threats get more sophisticated and continue to evolve both in
techniques and magnitude. An organization must, therefore, analyze and research information
security and risk management issues to ensure the best security practices get implemented.
Cybercriminals in the modern world continuously discover and design new methods of tapping
and compromising sensitive company networks and data resources around the globe (Lundgren
et al., 2017). A growing and significant challenge among organizations include protecting crucial
information systems and data from malicious attacks.
Every company needs to be aware of information security importance, including financial
security, the building's security, and also the security of employees. Modern organizations
comprise of several information technology assets and infrastructures that require protection.
Organizational networks now act as lifelines that get depended on by employees to perform daily
and crucial tasks that generate revenue for the organization. It is, therefore, of importance for an
organization to recognize its information technology infrastructure as a vital asset that requires
optimal protection (Banham, 2017). Information and data play a crucial role in individuals' lives
and also most business processes and activities.
Most organizations now utilize business intelligence to gain meaningful insights from
organizational data, which requires gathering data from several heterogeneous sources. Insights
from business intelligence can get used to optimize the supply chain, create business
differentiators, identify social trends and issues, and also predict customer buying habits—
furthermore, business intelligence help organizations in gaining a competitive advantage.
Information security is, therefore, fundamental in protecting these assets, such as business
intelligence platforms. Information security is a collection of rules and standards that get utilized
to secure information regardless of where and how it gets used (Stewart et al., 2017). Information
security covers a broad topic that requires several technologies and mechanisms to get
Information security threats and risks are many and of several types. These threats can
include intellectual property theft, sabotage, identity theft, information extortion, software
attacks, and even theft of information and equipment. Threats include anything or activities that
take advantage of existing vulnerabilities to breach the security of a system or network. These
breaches can negatively modify, erase, and even harm vital organizational objects. Software
attacks include attacks where the attacker utilizes a malicious code or software to breach systems
or networks (Toshniwal et al., 2015). Trojan horses, worms, bots, malware, and viruses are all
malicious software that can get used for an attack, although they behave differently.
Insider threats are probably the most common, and they are very challenging to protect
organizational information assets against. This threat occurs when employees within an
organization unintentionally or intentionally misuse authorized access to negatively impact
organization critical systems and data. Further, insider threats can g...
15 Million Students Helped!
Sign up to view the full answer