IT Security for the Small Business
$19.95 Buy and instantly download this paper now
The paper identifies the threats and vulnerabilities of small businesses' email systems and their data storage or information library and discusses the importance of confidentiality, integrity and availability of the information system. The paper considers the numerous solutions and security methodologies but notes that they are useless if the people managing or operating them have not undergone the proper training. The paper also discusses how users and employees must be trained in information security and to avoid individuals who practice social engineering to obtain passwords.
From the Paper:"Another major concern for small businesses is their data storage or their information library. In today's Information Age, knowledge and information truly means power. Some small businesses rely on their proprietary information and loss of which means loss of the business. Like the email system, data storage should have an encryption system and access to it should be based on level of authority and type of job function an individual has. This is usually done by programming an ACL or access control list that specifies who can go to what and how much information can be accessed. In addition, data and information stored in various media must have a classification system to determine the level of importance and who can access per level. Any security measures to be implemented though should be covered by written policies approved and signed-off by management and duly acknowledge by personnel in the company. Without a clear written policy, there would be no legal basis for litigation should information breach occur.
"Small business owners should always remember that in protecting the IT infrastructure, they should always consider three major factors. These are the confidentiality, integrity and availability of the information system. This is often known as the CIA Triad and all three are equally important but very difficult to balance."
Sample of Sources Used:
- The Practitioner. (2007). A guide to computer crime. [Online] Retrieved October 28, 2009 from, http://legal.practitioner.com/computer-crime/index.htm.
- Symantec Corporation. (2009). Symantec global Internet security threat report trends for 2008, vol. XIV (4). [Online] Retrieved October 28, 2009 from, http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xiv_04-2009.en-us.pdf.
- US Computer Emergency Readiness Team. (2009, May 6). Cyber security tips. [Online] Retrieved October 28, 2009 from, http://www.us-cert.gov/cas/tips/.
Cite this Term Paper:
IT Security for the Small Business (2012, May 21) Retrieved December 02, 2023, from https://www.academon.com/term-paper/it-security-for-the-small-business-151071/
"IT Security for the Small Business" 21 May 2012. Web. 02 December. 2023. <https://www.academon.com/term-paper/it-security-for-the-small-business-151071/>