Free Essay

Security and Information Protection

In:

Submitted By kobinamensah
Words 1987
Pages 8
Q1. NAME AND DESCRIBE THREE AUTHENTICATION METHODS.
Authentication is defined by Essentials Guide as is the process of determining whether someone or something is, in fact, who or what it is declared to be.
Authentication means verifying the identity of someone (a user, device, or an entity) who wants to access data, resources, or applications. Validating that identity establishes a trust relationship for further interactions.
Authentication is the first step in access control, and there are three common methods used for authentication:

What you have method: – Examples of this method includes keys, badges, ID, pass cards/smart card, tokens. These are physical objects and go towards identifying you by what you physically “own”. A smart card is credit card sized card that has an embedded certificate used to identify the holder. The obvious problem here is that objects can be taken and are not tied or "signed" to any particular person. This makes it easy to loan your verification for temporary uses like valet parking, but objects can be stolen. Keys can be duplicated and IDs can be faked,

What you are method: - DNA, fingerprints, voice match, cadence of your typing, your walk, talk, act. Your smell, shoeprints, aura, your retinal scan, your vein patterns. Anything that leaves the impression of YOU, but nothing that can come from someone else. These are things that can be taken from you. They cannot be faked but can be stolen. Secondary level of security, what you are is better than what you have, but is nothing compared to what you know.

What you know method:. Passwords, passphrases. Things that cannot be beaten out of you. Passwords cannot be compelled to be told, they cannot be stolen (from your mind), and they cannot be duplicated. Other examples include your memories. We've all thought about the time traveler trick. Imagine yourself from the future convincing yourself now that you are really the future you. You can name things that only you could possibly know, such as your 2nd pet's name, the number of girls you've slept with, etc.
Needless to say, this method of authentication is the most secure and the most unwieldly.

Q2. DESCRIBE THE ROLES OF FIREWALLS, INTRUSION DETECTION SYSTEMS, AND ANTIVIRUS SOFTWARE IN PROMOTING SECURITY.

Security refers to the policies, procedures, and technical measures that can be applied to prevent unauthorized access, alteration, theft, or physical damage to information systems. Some of the security systems used by firms are as follows:
A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic. Firewalls prevent unauthorized users from accessing internal networks. It helps screen out hackers, viruses and worms that try to reach computers over the internet. They protect internal systems by monitoring packets for the wrong source or destination, or by offering a proxy server with no access to the internal documents and systems, or by restricting the types of messages that get through, for example, e-mail. They act as a measure of control, enforcing the relevant components of the security policy. A firewall can be a number of different components such as a router or a collection of host machines. However, the basic function of a firewall is to protect the integrity of the network which is firewall controlled.

An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. IDS are not a preventive measure. They will not stop intruders breaking into a system. Neither will they prevent internal damage to a system. As the name clearly states, they are a detection system, thus implying that abuse of a system is reported as and when it happens.
IDS come in a variety of “flavors” and approach the goal of detecting suspicious traffic in different ways. There are network based (NIDS) and host based (HIDS) intrusion detection systems. Some systems may attempt to stop an intrusion but is neither required nor expected of a monitoring system. Intrusion detection systems monitor the most vulnerable points or “hotspots” in a network to detect and deter unauthorized intruders. These systems often also monitor events as they happen to look for security attacks in progress. Sometimes they can be programmed to shut down a particularly sensitive part of a network if it receives unauthorized traffic.

Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms. These tools are critical for users to have installed and updated because a computer without anti-virus software installed will be infected within minutes of connecting to the internet. Antivirus software is designed to check computer systems and drives for the presence of computer viruses and worms and often eliminates the malicious software, whereas antispyware software combats intrusive and harmful spyware programs. Often the software can eliminate the virus from the infected area. To be effective, antivirus software must be continually updated.

Q3. EXPLAIN HOW ENCRYPTION PROTECTS INFORMATION.

From Wikipedia: Encryption is the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. Encryption, the coding and scrambling of messages, is a widely used technology for securing electronic transmissions over the Internet and over Wi-Fi networks. Encryption offers protection by keeping messages or packets hidden from the view of unauthorized readers.
Encryption is crucial for ensuring the success of electronic commerce between the organization and its customers and between the organization and its vendors. Encryption is the security technology which protects the privacy of information sent over a network (e.g. your bank details). A person’s credentials (password and username) is protected using encryption. If no encryption is used to protect the information as it is sent over the network, an attacker could capture those credentials and assume the identity of the originator. In a well-designed system, only the intended recipient is able to decrypt the encrypted data stream to recover the information. However, encryption does not guarantee trust and authentication. Encryption can be used to protect data "at rest", such as files on computers and storage devices (e.g. USB flash drives). In recent years there have been numerous reports of confidential data such as customers' personal records being exposed through loss or theft of laptops or backup drives. Encrypting such files at rest helps protect them should physical security measures fail.
Encryption is also used to protect data in transit, for example data being transferred via networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. Q4. DISTINGUISH BETWEEN FAULT-TOLERANT AND HIGH-AVAILABILITY COMPUTING, AND BETWEEN DISASTER RECOVERY PLANNING AND BUSINESS CONTINUITY PLANNING. Fault-tolerant computer systems contain redundant hardware, software, and power supply components that can back a system up and keep it running to prevent system failure. Some systems simply cannot be allowed to stop, such as stock market systems or some systems in hospitals. A fault tolerant environment has no service interruption but a significantly higher cost, while a highly available environment has a minimal service interruption
Fault-tolerant computers contain extra memory chips, processors, and disk storage devices to back up a system and keep it running. They also can use special software routings or self-checking logic built into their circuitry to detect hardware failures and automatically switch to a backup device. Fault tolerance means you don't lose the in-memory application state in the event of a failure such as a host crash. Fault Tolerance is much harder than high availability in a virtual environment because you have to maintain two copies of a virtual machine, each on separate hosts. As memory and device state change on the primary, these changes have to be recorded and replayed on the secondary copy at the same time.
High-availability computing: is commonly thought of as a way to ensure a resource stays available, but the resource may suffer from some minor downtime. It is also designed to maximize application and system availability, and help firms recover quickly from a crash, but Fault tolerance promises continuous availability and the elimination of recovery time altogether. High-availability computing environments are a minimum requirement for firms with heavy electronic commerce processing requirements or for firms that depend on digital networks for their internal operations.
From an article in IBM knowledge centre, High availability views availability not as a series of replicated physical components, but rather as a set of system-wide, shared resources that cooperate to guarantee essential services. High availability combines software with industry-standard hardware to minimize downtime by quickly restoring essential services when a system- component or application fails. While not instantaneous, services are restored rapidly, often in less than a minute.
High availability systems are an excellent solution for applications that must be restored quickly and can withstand a short interruption should a failure occur. Some industries have applications so time-critical that they cannot withstand even a few seconds of downtime. Many other industries, however, can withstand small periods of time when their database is unavailable. For those industries, HACMP™ can provide the necessary continuity of service without total redundancy.
Disaster recovery planning (DRP): This devises plans for the restoration of computing and communications services after they have been disrupted by an event such as an earthquake, flood, or terrorist attack. Disaster recovery plans focus primarily on the technical issues involved in keeping systems up and running, such as which files to back up and the maintenance of backup computer systems or disaster recovery services. As part of the business continuity process an Organisation will normally develop a series of DRPs. These are more technical plans that are developed for specific groups within an Organisation to allow them to recover a particular business application. The most well-known example of a DRP is the Information Technology (IT) DRP. The typical test for a DR Plan for IT would be; "if we lost our IT services how would we recover them?"
IT DR plans only deliver technology services to the desk of employees. It is then up to the business units to have plans for the subsequent functions.
Business Continuity Planning (BCP): This is best described as the processes and procedures that are carried out by an Organisation to ensure that essential business functions continue to operate during and after a disaster. By having a BCP, organizations seek to protect their mission critical services and give themselves their best chance of survival. This type of planning enables them to re-establish services to a fully functional level as quickly and smoothly as possible. BCPs generally cover most or all of an organization’s critical business processes and operations. Business continuity planning focus on how the company can restore business operations after a disaster strikes. The business continuity plan identifies critical business processes and determines action plans for handling mission-critical functions if systems go down.
Reference
1. Article by Darril Gibson, (2011), Pearson it Certification – Understanding the Three Factors of Authentication Retrieved from http://www.pearsonitcertification.com/articles

2. Article by Standby Consulting Limited, Retrieved from http://www.standbyconsulting.com/continuity-planning/bcp-vs-drp 3. Article by Universal Securities, (2007) Retrieved from http://unisec.blogspot.com/2007/11/three-types-of-authentication.html

4. Chad Cook (ccook@illusive.org), Retrieved from http://www.symantec.com/connect/articles/introduction-encryption

5. Essentials Guide. Retrieved from http://searchsecurity.techtarget.com/definition/authentication 6. Julie Greensmith and Uwe Aickelin (2005), Computer Science Technical Report No. NOTTCS-TR – 2005-1, Firewalls, Intrusion Detection Systems and Anti-Virus Scanners. Retrieved from http://www.cs.nott.ac.uk/TR/2005/2005-1.pdf 7. Kafka Khan Tutorial, IBM Knowledge Center, Retrieved from http://www-01.ibm.com/support/knowledgecenter.

Similar Documents

Premium Essay

Network Information Security and Protection Strategies

...Whether learning another language is comparatively easy or difficult for you, your goals and attitude about improving your English have a strong effect. If you are determined to improve your English, and you make a conscious effort to do so, improvement is more likely. There are many approaches to improving your English while you are in the uk The best way to study English is by 3 ways: reading, listening and practice more. Reading newspapers, magazines and books widen your vocabulary. Circle the unfamiliar words you will encounter; then try to look for the meaning when you're done reading and use it by your own. Read this over and over until you familiarize the word. Reading English books will help, and keep a list of difficult vocabulary words that you can review. . Listening is important too when you want to learn English. Active listening Become an active listener by paying attention to what people are saying around you. When someone is speaking, listen carefully and try to remember what he/she says. Another way is to listen to television or radio that provides good English speaking programs. Practice socializing It is not always easy to talk to strangers. You might feel uncomfortable. Speak and write English as often as you can, even with your country mates, as frequent usage of the English language will increase your understanding and confidence. Practice makes perfect. Join a discussion, and don't be afraid to commit a mistakes. There is no short cut to learn...

Words: 266 - Pages: 2

Premium Essay

A Risk Analysis for Information Security and Infrastrucure Protection

...A Risk Analysis for Information Security and Infrastructure Protection Special Topics in Criminology and Criminal Justice Columbia Southern University January 03, 2012 A Risk Analysis for Information Security and Infrastructure Protection OBJECTIVE The sole purpose for performing a risk analysis for IT systems is to ensure businesses and or organizations, whether small or large to accomplish its missions by better securing the IT systems that store, process, or transmit organizational information. The primary function of risk analysis is to identify and correct the vulnerabilities and threats of an IT system. It enables management to make well-informed risk management decisions and justify the spending that is part of an IT budget. This also assists management in authorizing or accrediting the IT systems based on the performance results of a risk analysis. TARGET AUDIENCE Risk analysis will encompass a basic guide for experienced and inexperienced, technical and non-technical personnel who support or use risk analysis for their IT systems. This will included a detail listing and job description of personnel based on the National Institute of Standards and Technology (NIST) research: Senior management and mission owners make decisions about the IT security budget, and they ensure the implementation of risk management for agency systems and the security provided for the IT systems. The Designated Approving Authority (DAA) is responsible...

Words: 1308 - Pages: 6

Premium Essay

Final

...Increasing Security in Bank Network Security to Prevent Information Leaks There are three main pillars of bank network security including firewalls, intrusion detection and intrusion prevention. Additional network security and added firewall protection will help banks keep information safe and confidential. An overkill of security, having mass protection from viruses, and doubling up on firewalls will aid in this effort. Taking measures to extremes to ensure the best protection from any type of malware or virus threat, and keeping information secure where it’s meant to be is a huge concern of banks. Ensuring the protection of client’s information assists with the bank staying in business and keep customers coming. Clients need the knowledge that their information and money is protected and not accessible to any outside intrusion. If a client is aware of the extreme measures of protection taken on their delicate information, they will feel more comfortable in using a banking system. A well protected bank network, with top of the line security monitoring is a much safer pick to cliental, and network security in banking is just as important as general security over the bank! An alarm system, cameras, and locking the building and safes holding moneys, pose the same type of protection of individual moneys in being transferred in some way. Network security is slightly more demanding than general security however, because an intruder in a bank’s network has access to...

Words: 1441 - Pages: 6

Premium Essay

Term

...Information Security Program Guide For State Agencies April 2008 Table of Contents INTRODUCTION .......................................................................................................................................................3 A SUGGESTED IMPLEMENTATION STRATEGY .............................................................................................5 SECURITY COMPONENTS ...................................................................................................................................12 RISK MANAGEMENT ................................................................................................................................................12 POLICY MANAGEMENT ............................................................................................................................................14 ORGANIZING INFORMATION SECURITY ....................................................................................................................16 ASSET PROTECTION .................................................................................................................................................18 HUMAN RESOURCES SECURITY ...............................................................................................................................20 PHYSICAL AND ENVIRONMENTAL SECURITY ...........................................................................................................22 COMMUNICATIONS...

Words: 14063 - Pages: 57

Premium Essay

Is2007

...0.1 WHAT IS INFORMATION SECURITY? 0.2 WHY INFORMATION SECURITY IS NEEDED? 0.3 HOW TO ESTABLISH SECURITY REQUIREMENTS 0.4 ASSESSING SECURITY RISKS 0.5 SELECTING CONTROLS 0.6 INFORMATION SECURITY STARTING POINT Information security is defined as the preservation of confidentiality, integrity and availability of information … Information security is defined as the preservation of confidentiality, integrity and availability of information … 0.7 CRITICAL SUCCESS FACTORS 0.8 DEVELOPING YOUR OWN GUIDELINES 1 SCOPE 2 TERMS AND DEFINITIONS 3 STRUCTURE OF THIS STANDARD 3.1 CLAUSES Security controls directly address risks to the organization, therefore risk analysis is a starting point for designing controls. Security controls directly address risks to the organization, therefore risk analysis is a starting point for designing controls. 3.2 MAIN SECURITY CATEGORIES 4 RISK ASSESSMENT AND TREATMENT 4.1 ASSESSING SECURITY RISKS Information security policies, standards, procedures and guidelines drive risk management, security and control requirements throughout the organization Information security policies, standards, procedures and guidelines drive risk management, security and control requirements throughout the organization 4.2 TREATING SECURITY RISKS 5 SECURITY POLICY 5.1 INFORMATION SECURITY POLICY 5.1.1 Information security policy document 5.1.2 Review of the information security policy 6 ORGANIZATION OF INFORMATION SECURITY Defines the...

Words: 1623 - Pages: 7

Free Essay

Critical Infrastructure Protection

...Infrastructure Protection Pamela S. York CIS502, Dr. Glenn Hines 2/14/15 Abstract The explosion of the accessibility of information and data via the today’s Web has brought along the concern and need for cyber security. With these issues of cyber security has also come the need to protect national informational assets from hackers and such who utilize the Web as a means to attack information that can aid in cyber terrorism. Information professionals are now looking to measures of protection that will ensure private citizens are not put into danger by the threat of cyber espionage. This also has extended to the protection of critical infrastructure within the United States and abroad. Critical Infrastructure Protection With the ever evolving presence of cyber-attacks that threaten to put citizens’ privacy and Internet security at risk, the government has had to intervene in order to take measures to protect its’ citizens due to the alarming fact that cyber-attacks are replacing other modes of attacks by terrorists. The Department of Homeland Security, created in 2002, was developed to carry out broad missions such as preventing terrorist attacks within the United States. This was mainly in response to the terrorist attacks that occurred on U.S. soil on September 11, 2001. Since then the DHS has taken on the mission of developing security that extends to information security and developing plans to implement critical infrastructure. The Homeland Security Act of 2002 extends...

Words: 1329 - Pages: 6

Premium Essay

Huffman Trucking Benefits Election System Risks

...Election System Security Lisa M. Gardner CMGT442: Information Systems Risk Management March 19, 2012 Craig McCormick Huffman Trucking: Benefits Election System Huffman Trucking Company has requested a new Benefits Election System to be implemented within the organization. The current benefit packages include medical, dental, and vision plans for employees. For the Benefit Election System, employee information and the benefit package they choose are stored and managed on a database system. This can either be a hardcopy paper file or an electronic file. Regardless of the storage method, security measures need to be implemented to protect employee’s privacy and information as well as preserve company assets from theft and/or litigation. Huffman Trucking Huffman Trucking has implemented such a system called the Benefits Election System, which assists management in tracking and reporting employee benefits (University of Phoenix, 2005). This paper will examine the security risks and requirements of the Benefits Election System of the organization. Security Requirements Ensuring the security of organizational and employee information is vital for any organization. Security misfortune can be damaging to the organization and the affected employees. In the case of Huffman Trucking information stored in the database includes names, social security numbers,...

Words: 1194 - Pages: 5

Premium Essay

Cyber Security

...STUDY GUIDE Cyber Security 1. What is the difference between a threat agent and a threat? Threat: A category of objects, persons, or other entities that presents a danger to an asset. Threats are always present and can be purposeful or undirected. For example, hackers purposefully threaten unprotected information systems, while severe storms incidentally threaten buildings and their contents. Threat agent: The specific instance or a component of a threat. For example, all hackers in the world present a collective threat, while Kevin Mitnick, who was convicted for hacking into phone systems, is a specific threat agent. Likewise, a lightning strike, hailstorm, or tornado is a threat agent that is part of the threat of severe storms. 2. What is the difference between vulnerability and exposure? Vulnerability: A weaknesses or fault in a system or protection mechanism that opens it to attack or damage. Some examples of vulnerabilities are a flaw in a software package, an unprotected system port, and an unlocked door. Some well-known vulnerabilities have been examined, documented, and published; others remain latent (or undiscovered). Exposure: A condition or state of being exposed. In information security, exposure exists when a vulnerability known to an attacker is present. 3. How is infrastructure protection (assuring the security of utility services) related to information security? The organization needs to have clear parameters and set regulation when it...

Words: 894 - Pages: 4

Premium Essay

Cis8018

...Introduction Health organizations are considered to posses’ high amount of information pertaining to customer and diagnosis which is of vital importance from the security point of view. Looking at the high security requirement for the information contained in the system for health organizations it is important to maintain an information system which can provide data security so that unauthorized access to information contained in information system can be prevented. In present context Nickol Bay hospital has been selected for the paper to consider review of information security system. Nickol Bay is one of the famous health organizations in Australia which is evolving at a rapid pace and looking at the increasing information requirement for the organization it is important to have a robust information system which can cater to the requirement of various stakeholders. The aim of present paper is to analyze information security in context of Nickol Bay hospital located in Australia. Information risk management system would be analyzed for the current organization along with several protection mechanisms which are in place in order to safeguard information system against any kind of undesired usage of information system. In addition to protection mechanism role of personnel in information security and consideration for legal & ethical aspect for information security would be considered. Finally present paper would review implementation of PRTG network in context to Nickol Bay...

Words: 1742 - Pages: 7

Free Essay

Cis 502 Critical Infrastructure Protection

...CIS 502 Critical Infrastructure Protection Click Link Below To Buy: http://hwaid.com/shop/cis-502-critical-infrastructure-protection/ Due Week 6 and worth 50 points Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure. The following documents titled, “National Infrastructure Protection Plan”, and “Critical Infrastructure Protection”, may be used to complete the assignment. Write a three to five (3-5) page paper in which you: 1. Examine the Department of Homeland Security’s : a. mission b. operations c. responsibilities 2. Explain what Critical Infrastructure Protection (CIP) initiatives are, what are protected, and the methods used to protect our assets. 3. Describe the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure. 4. Evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure. 5. Suggest three (3) methods to improve the protection of our critical infrastructure and justify each suggestion. 6. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times...

Words: 1288 - Pages: 6

Premium Essay

Jjjjjj

...Introduction to the Management of Information Security Chapter Overview The opening chapter establishes the foundation for understanding the field of Information Security. This is accomplished by explaining the importance of information technology and defining who is responsible for protecting an organization’s information assets. In this chapter the student will come to know and understand the definition and key characteristics of information security as well as the come to recognize the characteristics that differentiate information security management from general management. Chapter Objectives When you complete this chapter, you will be able to: • Recognize the importance of information technology and understand who is responsible for protecting an organization’s information assets • Know and understand the definition and key characteristics of information security • Know and understand the definition and key characteristics of leadership and management • Recognize the characteristics that differentiate information security management from general management INTRODUCTION Information technology is the vehicle that stores and transports information—a company’s most valuable resource—from one business unit to another. But what happens if the vehicle breaks down, even for a little while? As businesses have become more fluid, the concept of computer security has been replaced by the concept of information security. Because this new concept covers...

Words: 2580 - Pages: 11

Premium Essay

Position Paper Summary

...Summary Committee: GA Topic: Development in the field of information and telecommunication in the context of information security Dear delegates, After reading your position papers, we made a summary as follows. Please read it and may it help you. Country Name Argentina Basic Position Argentina is focusing on cracking down the ill-using of ICTs. Past Actions Reached a ‘Tunisia commitment’ with many countries to make the commitment in advancing the development of information technology and accelerate the national exchange. Proposed Solutions (1) Introduce a law named" Information security law "to promote the protection of the domestic information security. (2) Call upon national institutions and social organizations to corporate to promote the maintenance of information security. (3) Call for regional organization to implement technology exchange. (1) Normalize laws and standards on cyber perpetration and ICT intelligence use and supply. (2) Promote a comprehensive collaboration framework based on critical regional cyber security organizations. (3) Elaborate common terms and definitions and exchange national views on the use of ICTs in conflict for the sake of confidence-building. Australia Australian government calls for international collaboration to cope with information perpetration and to establish constricting norms on the state use of ICT, relieving international instability and enhancing the freedom of information. Communication and cooperation among (1) Committed...

Words: 4012 - Pages: 17

Premium Essay

Analysis and Comparison of Glba and Hipaa

... 3. List three (3) similarities between GLBA and HIPAA. 1. Safeguards Rules to protect customer information and consumer personal information. Security Rules 2. Protection of Privacy Rules from third party data sharing. 3. Protection of Financial Privacy Rules 4. List five (5) examples of privacy data elements for GLBA as defined in the privacy rule. 1.Safeguard Rules- protect customer information 2. Pretexting- protect consumers from individuals and companies that obtain their personal financial information under false pretenses. 3. Financial Privacy rules-governs the collection and disclosure of customers personal financial information by financial institutions. 4. Protection against credit reporting agencies 5. Protection from financial institutions that collect information from their own customers. 5. List five (5) examples of privacy data elements for HIPAA as defined in the privacy rule. a. Protection of Electronic Protected Health Information b. Covered entities must put in place secure electronic protection of health information. c. .claims and benefits d. Billing Services e. Healthcare providers 6. List three (3) differences between GLBA and HIPAA. 1. a. HIPPA protects and safeguard Healthcare patient Information b. GLBA protects and safeguard Financial customer information 2. a. HIPPA – has security rules to protect personal healthcare bill pay, with healthcare clearing houses that...

Words: 842 - Pages: 4

Premium Essay

Discussion Questions

...Discussion Question 1 - Week 1 (Thursday): Discuss what makes a successful information security awareness program and how a security awareness program can be one of an organization’s most powerful protection strategies. Security can mean different things to different people. Some believe that security means the protection of property and/or life, while another may believe that it means the guarding of valuable information, such as top secret documents. No matter what your definition of security is, it all has one main thing in common: security is the protection of something from something. When talking about Information Security, this meaning relates more to the protection of data and information. However; how does one protect vital information that is important either to an individual or to a business? The answer is through a solid and well-developed security awareness program. What exactly is an awareness program? Is it making sure that everyone is on the same page or knowing about the policies and procedures of the organization? Actually, it is, but it is also knowing what to do when those policies and procedures are not followed and making sure that the any information, vital to the company of not, is available to only those individuals who need it. An effective security program must take into consideration the business purposes and assignment of the organization and ensure that these purposes are met as carefully as possible. This must include...

Words: 609 - Pages: 3

Premium Essay

Symantec

...$23.10 Volume 4,053,739 Avg. Vol 3,928,393 52-wk High $27.32 52-wk Low $18.75 SEARCH STOCKS Submit FULL DESCRIPTION Symantec Corporation, incorporated on April 19, 1988, is a security, backup and availability solutions. The Company’s products and services protect people and information in any digital environment from the smallest mobile device, to the enterprise data center, to cloud-based systems. The Company’s software and services protect against advanced threats independent of the device and environment in which information is used or stored. The Company operates in three segments: User Productivity & Protection, Information Security, and Information Management. User Productivity & Protection The User Productivity & Protection segment focuses on making customers to be protected at home and at work. These products include its Norton solutions, endpoint security and management, encryption, and mobile offerings. Its Norton products help customers protect against increasingly complex threats and address the need for identity protection, while also managing the increase in mobile and digital data, such as personal financial records, photos, music, and videos. The endpoint security and management offerings support the evolving endpoint, providing advanced threat protection while helping reduce cost and complexity. The mobile solutions help organizations secure corporate data while gaining visibility into and control of all mobile platforms and enforcing...

Words: 513 - Pages: 3