preview

The Information Security Risk On The Life And Solutions

Better Essays

Introduction
In this generation of advance Information Technology, people exchange the information using numerous devices to accomplish their task in routine life. Information which used to be recorded on paper is now taking form of electronic record. Personal Information is now more feasible to access or destruct for the attacker because of weak IT security like virus or attack to the system or network. To protect the privacy, individual should secure their information. However, the only way to determine flaws and recognize threats, weather it is technical or non-technical or any other, is to find vulnerability and perform risk assessments. In this paper, we will discuss the information security risk in the life and solutions to mitigate …show more content…

For the information security, it is essential to find risks related to the use, processing, storage, and transmission of information or data and the processes and systems used for that.
Unauthorized access, usage, recording, modification, distraction, etc. are the risk to the information security. There are many different ways through which personal information can be lost or accessed, misused, modified, or disclosed. Common risks to the information security are described below:
• Unauthorized access or misuse of records by a friend or colleague or any other familiar person.
• Hacking or other illegal acquisition of system or device database or information by outsider.
• By mistake disclosure or sending of information to wrong person or organization.
• Failure to store or organize information properly and securely.
• Loss or theft of portable storage devices, paper documents, computer or any other equipment containing personal information.
In order to develop a proper security which can protects critical data, systems, and other resources, individual must first understand what it is facing in terms of potential sources of harm that may exploit existing vulnerabilities. Threat assessment identifies potential sources of attack to information assets and estimating the probability and consequences associated with their action. Understanding of the source of attacks, along with their likelihood of

Get Access