Information Security

339 words | 2 page(s)

The advent of information systems has led to the emergence of complex computer entities and devices in the inspired the society today. These technological; advancements have also threatened the safety of the information systems through reducing the security levels of the technological entities. The use of complex technological; security measures is one of the realistic approaches that can be used towards the management of the information systems security challenges. This can be through the development of tools and security infrastructure (Regine, 2015). There is also a need for human beings to protect their systems in order to reduce the risk of security threats.

There are various problems associated with information systems in the society today. Some of the problems includes the threats that may lead to the leakage of confidential information from the information systems. This can reduce the integrity of the info ration systems and the information that is stored in the systems. The risk in the information systems can also lead to high levels of theft from the leakage of sensitive information from the people (Stephan, 2013). The massive reduction in the acceptance to the levels of security is also one of the factors that can lead to the low confidence levels in the computer systems.

puzzles puzzles
Your 20% discount here.

Use your promo and get a custom paper on
"Information Security".

Order Now
Promocode: custom20

There are various ways through which these ethical challenges can be addressed, some of the realistic approaches includes the needs for the users of the information systems to undergo a positive cultural; transformation to safeguard the information systems. The use of complex systems and control mechanisms against information security is also elemental to0warrs the reduction of the threats posed by the information systems. This can include the use of the software programs that can protect the information systems and computer devices against any malicious attacks (Stair & Reynolds, 2013). The use of legitimate applications is also elemental towards promoting the integrity of the security systems.

    References
  • Stair, R. & Reynolds, G. (2013). Fundamentals of Information Systems. Boston. Cengage.
  • Regine, B. (2015). Managing Information systems. London: Gower Publishing.
  • Stephan, G. (2013). Information systems Security. New York: Oxford University Press.

puzzles puzzles
Attract Only the Top Grades

Have a team of vetted experts take you to the top, with professionally written papers in every area of study.

Order Now