Security of Data and Information Memo Outline (2)

Security of Data and Information Memo Outline

To: Instructor’s name

From: Student’s name

Date: July 15, 2021

Subject: Security of data and information

Cc: Classmates

Introduction

-definition of data and information security

-reason why security of data and information is important

statement of fact

– Ways of making sure that data and information between organizations and companies is secure

– Reasons for securing the transfer of data between two entities

3. Argument

– Challenges in achieving data and information security

– Solutions to challenges of securing data

Having strong passwords in computers and other gadgets

Not using public connections like Wi-Fi

Having policies in place to prevent hackers and other malicious groups from trying to get info ration that is not theirs for example increase in the number of years a person to be jailed.

– Relevance of data and information security to;

Companies

Organizations

Institutions

Government

4. Conclusion

-Recommendations and plan of action for preventing loss of data to the wrong hands

Strong passwords

Using VPNs for those who can

Policies making the stealing of data criminal offense

Education of the public how their data might get into the wrong hands and how to get it back

References

Baker, W. H., & Wallace, L. (2007). Is information security under control?: Investigating quality in information security management. IEEE Security & Privacy, 5(1), 36-44.

Blakley, B., McDermott, E., & Geer, D. (2001, September). Information security is information risk management. In Proceedings of the 2001 workshop on New security paradigms (pp. 97-104).

Moore, A. P., Ellison, R. J., & Linger, R. C. (2001). Attack modeling for information security and survivability. Carnegie-Mellon Univ Pittsburgh Pa Software Engineering Inst.

Peltier, T. R. (2013). Information security fundamentals. CRC press.

Von Solms, B., & Von Solms, R. (2005). From information security to… business security?. Computers & security, 24(4), 271-273.

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply