SEC/440
04/22/2013
Information System Security
In today’s time, every organization is made up of information security systems. Information security systems are what keep an organization running smoothly and efficiently while holding all their important information in their computers and networks. All information security systems consist of password protections, firewalls; many different security features can prevent hackers from attacking, physical protection of the network and computer systems as well as confidentiality requirements.
Password protection is highly important when talking about Information security systems. Passwords are the first step in keeping out hackers and unwanted guests from entering your security systems. All organizations will require passwords to enter their security systems. Also when dealing with passwords they will also require you to have different symbols. Things such as one capital letter or a total of three numbers in the password or even adding a special character may be a requirement when making a password for the security system.
Firewalls are extremely important when dealing with information security systems. “Firewalls are computer security systems that protect your office/home PCs or your network from intruders, hackers & malicious code. Firewalls protect you from offensive software that may come to reside on your systems or from prying hackers. In a day and age when online security concerns are the top priority of the computer users, Firewalls provide you with the necessary safety and protection” ("An introduction to," 2012). In information system security there are three types of firewalls which can be used. The first type of firewall is called packet filtering or packet purity. The second firewall is called a proxy. Many organizations will have Proxies. Proxies I believe are to be the most popular. The third is Inspection. Organizations using firewalls can also block certain
References: (n.d.). An introduction to firewalls. (2012). Retrieved from http://www.firewallinformation.com/ (n.d.). How to stop computer hackers in their tracks. (2013). Retrieved from http://www.streetdirectory.com/travel_guide/154369/security/how_to_stop_computer_hackers_in_their_tracks.html Schnider, D. (n.d.). 10 physical security measures every organization should take. (2007). Retrieved from http://www.techrepublic.com/blog/10things/10-physical-security-measures-every-organization-should-take/106