Table of Contents
This involves identifying and reacting to security violations quickly to prevent further damages. It needs to be done as soon as possible especially on sensitive information.
Deterrence
These controls are about discouraging potential security breaches. All the security threats to information systems are analyzed and appropriate preventive security measures are put in place in order to prevent them.
Recovery
This involves restoring the operating state to normal after an attack or failure.
Moreover, the following different secured transactions techniques are used to maintain secured information system:
Password: This is a string of characters that is used to authenticate, prove identity or gain access to on information system resource (Zviran & Haga, 2008). Users should always choose strong passwords and periodically change the passwords to prevent intruders from guessing it.
Digital certificate: This is an electronic license that establishes a person’s credentials when doing transactions on the web. It contains a person’s name, serial number, expiry date, a copy of the holder’s public key, and the digital signature of the certificate-issuing authority.
Encryption algorithms: These are a set of very detailed and complex instructions which provide important security when there are communication signals over unsecure platforms like the internet.
Firewalls: This is a device or system that is designed to filter incoming and outgoing traffic that flows through a private network. It can be implemented in hardware, software or a combination of both.
Transponders: These are electronic wireless communication devise that monitors or controls signals by automatically responding to an incoming signal. This normally used in aircraft information systems to avoid collision.
Buy Free Custom «Detection» Essay Paper paper online
Conclusion
An effective information systems security creation and maintenance in an organization therefore requires better planning of security policies and procedures to the information, information systems and users.
FREE Extras:
- FREE revision (within 2 days)
- FREE title page
- FREE bibliography
- FREE outline (on request)
- FREE e-mail delivery
- FREE formatting
We Guarantee:
- Quality research and writing
- 24/7/365 Live support
- MA, BA, and PhD degree writers
- 100% Confidentiality
- No hidden charges
- Never resold works
- Complete authenticity
Paper Format:
- 12 pt. Times New Roman
- Double-spaced/Single-spaced papers
- 1 inch margins
- Any citation style
- Up-to-date sources only
- Fully referenced papers
Related Technology essays
0
Preparing Orders
0
Active Writers
0%
Positive Feedback
0
Support Agents