Sie sind auf Seite 1von 5

Running Head: INFORMATION SECURITY ARTICLE REVIEW 1

Information security article review

Student name

Profess

Course

Date of submission
INFORMATION SECURITY ARTICLE REVIEW 2

Hayes, K., & Li, S. (2017). Environmental risk assessment of genetically modified organisms:

Methodologies for transgenic fish. CABI.

Robert Roohparvar identifies information security as an assurance as a tool that has been

applied in day to day activity. In his theoretical analysis, the author depicts information

assurance as a practice design that helps keep data secure. The model prevents unauthorized

access, preventing any form of alternation during the cases, storage, and transmission of data

from one point to another. On the broader scope, the approach covers data in its primary form,

namely data in motion, stored, and data in use. In the analysis case, information security is

designed to manage and its structures to suit the transformational medium. Importantly, the

entire process is governed by policy and regulation. National Institute of technology and the

standard intentional organization have given a directive that should be followed in a typical

society management process. The purpose and objective should serve the course of the instituted

framework. Compliance and data principles, in their case, help a wide range of operations. Risk

assessment and enhanced infrastructure must have improved integrity, confidentiality, and data

availability in case of any requirement.

Sotnikov, I. (2018, January 16). How to perform an IT risk assessment. Retrieved from

https://blog.netwrix.com/2018/01/16/how-to-perform-it-risk-assessment/

The article describes risk assessment and security management as the initial process of

enhanced information security. Attaining a high and profiled security in giving the
INFORMATION SECURITY ARTICLE REVIEW 3

environment is determined by the information procedures adopted. ( Ilia Sotnikov, 2020) depict

the great need of managing information and the root path used. Poor infrastructure of the

information system (IS) puts an organization at a significant risk of losing data and system

application downtime. In the mitigation phase, there should be an identification of priorities in

the system. Amongst them include software, hardware, data, and interphase and society

architecture in the organization. Importantly, the topology adopted should reflect information

flow and technical response in case of any data comprise. Threat and exposures cause' malicious

access and interceptions in database and clod storages. In support of his theoretical framework,

analyzing information control is the fundamental element of attaining a conducive environment

and protected information system.

Andrew Mill. (2006). Fighting back against phishing. Retrieved from

https://www.bankinfosecurity.com/fighting-back-against-phishing-a-123

According to Andrew, the number of phishing attacks that involve the hijacking of

institutional financial brands have been rising. The attack poses a threat to the overall integrity of

the financial system. However, experts have developed and implemented strategies that deter

attacks and render them harmless. Defense strategies apply technology and other techniques that

involve consumer and employee education. For example, federal deposit insurance has invested

in four programs to ensure the security of their information. They have upgraded the existing

passwords based consumer and system authentication. They have also utilized scanning software

for proactive identification and the defense against phishing attacks.


INFORMATION SECURITY ARTICLE REVIEW 4

Furthermore, the organization has strengthened educational programs aimed at preventing

online scams. The scams can lead to account hijacking and other types related to identity theft.

The company has continued to emphasize sharing information between financial service

industries, technology providers, and the government. Information account hijacking can be

perpetrated in several ways and through different types of technology. Computer expertise

recommends layered approaches to information security. They also support the utilization of

email authentication, scanning tools, and two-factor authentication. The three strategies help

identify websites that pretend to have a financial relationship with the organization.

References
INFORMATION SECURITY ARTICLE REVIEW 5

Andrew Mill. (2006). Fighting back against phishing. Retrieved from

https://www.bankinfosecurity.com/fighting-back-against-phishing-a-123

Hayes, K., & Li, S. (2017). Environmental risk assessment of genetically modified organisms:

Methodologies for transgenic fish. CABI.

Sotnikov, I. (2018, January 16). How to perform an IT risk assessment. Retrieved from

https://blog.netwrix.com/2018/01/16/how-to-perform-it-risk-assessment/

Das könnte Ihnen auch gefallen