Guide on IT Security Awareness

This guide was created in an effort to condense the Information Technology Security Awareness presentation for simpler management comprehension. As such, it covers a variety of issues pertaining to various security ideas. It uses books and relevant websites as sources and adheres to the APA formatting standard.


To begin, the presentation examines information as a vital asset to a business. It goes on to emphasize the necessity of risk management and vulnerability identification as a first step in mitigating losses related with firm information. The presentation continues to describe security policies and regulatory organizations, giving three examples namely: NIST, NRC and IAEA. It also describes the notion of social networking and also presents three potential risks and threats to a company’s security.


The presentation examines the Software Development Life Cycle and considers its incorporation of the security aspect in reducing threats. It also explores reasons leading to slow adoption of cloud computing and examines the ethical / unethical aspects of hacking. Further, various ways of protecting information assets are discussed as well as the key elements of a security policy.


The notion of encryption (how it works) and its relevance as a premier IT security tool is also explored. In addition, it identifies five different jobs dealing with IT security and recommends IT certifications that are relevant currently. The presentation examines auditing as a tool to prevent risk and also proceeds to describe information assurance and security. The notion of employee security awareness is also discussed citing its relevance.


In conclusion, the presentation looks at the various elements of recovering from lost assets, internet connected systems, citing examples and IT security jobs that display high potentiality for growth this year.


The presentation makes use of the following references.


References:


Albright, D. (2017). 15 Examples of Internet of Things Technology in Use Today. Beebom. Retrieved 5 June 2017, from https://beebom.com/examples-of-internet-of-things-technology/


Category:Vulnerability - OWASP. (2017). Owasp.org. Retrieved 3 June 2017, from https://www.owasp.org/index.php/Category:Vulnerability


How Does Encryption Work, and Is It Really Safe?. (2017). MakeUseOf. Retrieved 3 June 2017, from http://www.makeuseof.com/tag/encryption-care/


Key Elements of an Information Security Policy. (2017). InfoSec Resources. Retrieved 3 June 2017, from http://resources.infosecinstitute.com/key-elements-information-security-policy/#gref


Merkow, M., & Briethaupt, J. (2014). Information security: Principles and practices (2nd ed.). Pearson Education.


Peltier, T. (2004). Information security policies and procedures (1st ed.). Boca Raton, FL: Auerbach Publications.


Rivard, F., Harb, G., & Meret, P. (2009). Transverse Information Systems (1st ed.). Hoboken: John Wiley & Sons.


Taraj, R. (2017). Follow secure software development life cycle to reduce risks | Cyber Security Community. Securitycommunity.tcs.com. Retrieved 5 June 2017, from https://securitycommunity.tcs.com/infosecsoapbox/articles/2016/01/15/follow-secure-software-development-life-cycle-reduce-risks


Tittel, E. (2017). Best Information Security Certifications For 2017 - Top 5 InfoSec Certifications. Tom's IT Pro. Retrieved 5 June 2017, from http://www.tomsitpro.com/articles/information-security-certifications,2-205.html


Whitman, M., & Mattord, H. (2014). Principles of information security (5th ed.). Boston: MA: Cengage Learning.

Deadline is approaching?

Wait no more. Let us write you an essay from scratch

Receive Paper In 3 Hours
Calculate the Price
275 words
First order 15%
Total Price:
$38.07 $38.07
Calculating ellipsis
Hire an expert
This discount is valid only for orders of new customer and with the total more than 25$
This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.

Find Out the Cost of Your Paper

Get Price