Beruflich Dokumente
Kultur Dokumente
Student name
Profess
Course
Date of submission
INFORMATION SECURITY ARTICLE REVIEW 2
Robert Roohparvar identifies information security as an assurance as a tool that has been
applied in day to day activity. In his theoretical analysis, the author depicts information
assurance as a practice design that helps keep data secure. The model prevents unauthorized
access, preventing any form of alternation during the cases, storage, and transmission of data
from one point to another. On the broader scope, the approach covers data in its primary form,
namely data in motion, stored, and data in use. In the analysis case, information security is
designed to manage and its structures to suit the transformational medium. Importantly, the
entire process is governed by policy and regulation. National Institute of technology and the
standard intentional organization have given a directive that should be followed in a typical
society management process. The purpose and objective should serve the course of the instituted
framework. Compliance and data principles, in their case, help a wide range of operations. Risk
assessment and enhanced infrastructure must have improved integrity, confidentiality, and data
Sotnikov, I. (2018, January 16). How to perform an IT risk assessment. Retrieved from
https://blog.netwrix.com/2018/01/16/how-to-perform-it-risk-assessment/
The article describes risk assessment and security management as the initial process of
enhanced information security. Attaining a high and profiled security in giving the
INFORMATION SECURITY ARTICLE REVIEW 3
environment is determined by the information procedures adopted. ( Ilia Sotnikov, 2020) depict
the great need of managing information and the root path used. Poor infrastructure of the
information system (IS) puts an organization at a significant risk of losing data and system
the system. Amongst them include software, hardware, data, and interphase and society
architecture in the organization. Importantly, the topology adopted should reflect information
flow and technical response in case of any data comprise. Threat and exposures cause' malicious
access and interceptions in database and clod storages. In support of his theoretical framework,
https://www.bankinfosecurity.com/fighting-back-against-phishing-a-123
According to Andrew, the number of phishing attacks that involve the hijacking of
institutional financial brands have been rising. The attack poses a threat to the overall integrity of
the financial system. However, experts have developed and implemented strategies that deter
attacks and render them harmless. Defense strategies apply technology and other techniques that
involve consumer and employee education. For example, federal deposit insurance has invested
in four programs to ensure the security of their information. They have upgraded the existing
passwords based consumer and system authentication. They have also utilized scanning software
online scams. The scams can lead to account hijacking and other types related to identity theft.
The company has continued to emphasize sharing information between financial service
industries, technology providers, and the government. Information account hijacking can be
perpetrated in several ways and through different types of technology. Computer expertise
recommends layered approaches to information security. They also support the utilization of
email authentication, scanning tools, and two-factor authentication. The three strategies help
identify websites that pretend to have a financial relationship with the organization.
References
INFORMATION SECURITY ARTICLE REVIEW 5
https://www.bankinfosecurity.com/fighting-back-against-phishing-a-123
Sotnikov, I. (2018, January 16). How to perform an IT risk assessment. Retrieved from
https://blog.netwrix.com/2018/01/16/how-to-perform-it-risk-assessment/