Threats to Information Security Essay

874 Words4 Pages
Many organizations are now facing huge threats to their stored information. This is putting organizations and individuals at risk of losing their privacy. There are factors that contribute to information vulnerability of an organization and to a personal level. In addition, there are measures that are put in place to help secure information.
The factors that pose a threat to information may include inter-connectivity and the wireless applications used in business (Rainer & Turban, 2009, p. 1). There is massive communication of computers following the inter-connectivity and this introduces a lot of challenges in the manning of information security (Rainer & Turban, 2009, p. 1). The massive inter-connectivity has acted as a brooding ground
…show more content…
Another threat to information security is organized cyber crime. This form of crime is done by organized organizations that are engaged in illegal activities over the internet (O'Brien & Marakas, 2008, p. 145). This crime targets weaknesses in some security software and the perpetrators rip off their victims billions of dollars (O'Brien & Marakas, 2008, p. 145). Cyber crime is considered non-violent but costly; since it is conducted by probably the most skillful hackers from powerful networks and computers. Another point is the lack of employee commitment to following security procedures, which results from lack of emphasis and follow-ups by the concerned managers (O'Brien & Marakas, 2008, p. 145).
To overcome these insecurities, there are several proposed measures that can be implemented. One of the initial actions towards protection of information should be risk management (Reynolds & Stair, 2005, p. 37). Under risk management, there should be risk analysis. The analysis should determine if there are enough assets to secure information in the organization (Reynolds & Stair, 2005, p. 37). The analysis should also deduce if the systems are cost-effective or not (Reynolds & Stair, 2005, p. 40). After analysis of the risks, an organization should conduct
Get Access