Jul 26, 2017

Achieving Business Information Security in Cyberspace

This paper concentrates on the primary theme of Achieving Business Information Security in Cyberspace in which you have to explain and evaluate its intricate aspects in detail. In addition to this, this paper has been reviewed and purchased by most of the students hence; it has been rated 4.8 points on the scale of 5 points. Besides, the price of this paper starts from £ 40. For more details and full access to the paper, please refer to the site.

Achieving Business Information Security in Cyberspace


According to Pesante (2008) there are three basic security concepts that are important to information on the Internet. Those are: confidentiality, integrity, and availability. In addition, she indicates that there are three additional concepts relating to the people who use information which are authentication, authorization, and nonrepudiation. Please read the full article that explains these concepts.

Pesante, L. (2008). Introduction to Information Security. Retrieved from the World Wide Web on 05/20/09 from http://www.us-cert.gov/reading_room/infosecuritybasics.pdf

Solutions to achieve information security are multi-faceted and require collaborations from multi-parties. It is not easy to assure information security, such as in the dimensions mentioned above. The following article broadens one`s views on security. Even though it focuses on the protection of infrastructure, one can learn from its methods of approaching security to solve other kind of security problems. It is a long article. You don`t need to read word-by-word. Please focus on the key concepts.

White House. (2009). Cyberspace Policy Reivew: Assuring a Trusted and Resilient Information and Communications Infrastructure. White House.

The following essays are much shorter and easier to read. They offer different perspectives and especially with unique views on the role of the government.

Schneier, B. (2012), The Big Question: Bruce Schneier. February 2012.

Gonsalves, A. (2012), RSA 2012: Three Greatest (and Surprising) Internet Security Dangers, CRN.

Case Assignment:

Prepare a 3-4 page paper addressing the question:

               "How to Achieve Business Information Security in Cyperspace?"

Assignment Expectations:

Use information from the modular background and case readings as well as any good quality resource you can find. Please cite all sources and provide a reference list at the end of your paper.

The following items will be assessed in particular:

  1. Your ability to consolidate ideas from reading materials.
  2. Your demonstration of your understanding of various dimensions of IT securities and available IT security solutions.
  3. Your ability to apply your understanding in national security policy in cyberspace to a business or an organization.
Achieving Business Information Security in CyberspaceNameInstitution AffiliationCourseDate of Submission Introduction In the day to- day life activities and economic vitality, security on business information is dependent upon on a safe, stable and resilient cyberspace. Today, many people and not only those in the business sector have come to rely on this vast array of networks in cyberspace in communicating, travelling, running businesses and the economy, powering homes and for other services. However, cyber space attacks and intrusions have dramatically increased at an alarming rate and therefore, disrupting essential operations, threatening the security of business operations as well as negatively affecting the economy in general (Guttman, and Swanson, 2008).Cyberspace security threats are in various forms and each type has its seriousness level that also requires different solution levels. The higher the level of the threat posed, the more complicated the strategy to be deployed in implementing safety measures in protection of cyberspace. For instance, the threats may in the forms of a more simpler malevolent codes identified as spyware and malware to serious viruses that can severely damage the whole contents in a computer. Further, there are cyberspace hackers who are able to access the computer and utilize or temper with personal information and data for ulterior motives. These are some of the dangers, which business entities need take into consideration and address them accordingly in order to achieve cyberspace security. Essentially, cyberspace security involves taking measures to keep documents and data from any unwarranted intrusion (Gonsalves, 2012). In the subsequent part, we will evaluate on how we can achieve business information security in cyberspace. How to Achieve Business Information Security in CyberspaceIn this age of technological advancement, a business entity with no network is typical of a city without roads. Businesses including small ones have seen the need to incorporate information systems and connection...

100% Plagiarism Free & Custom Written,
Tailored to your instructions

International House, 12 Constance Street, London, United Kingdom,
E16 2DQ

UK Registered Company # 11483120

100% Pass Guarantee

Order Now


We've produced some samples of what you can expect from our Academic Writing Service - these are created by our writers to show you the kind of high-quality work you'll receive. Take a look for yourself!

View Our Samples

FLAT 25% OFF ON EVERY ORDER.Use "FLAT25" as your promo code during checkout