Answered You can hire a professional tutor to get the answer.

QUESTION

Your assignment is to prepare and submit a paper on securing and protecting information.

Your assignment is to prepare and submit a paper on securing and protecting information. For example, worms and viruses can propagate through the sharing of networks and e-mails. Another major issue that is being experienced in networks is the phishing attacks that try to lure the users to provide personal information such as credit card information and bank account details. In any organization, be it in the hospitality or business industry, data security is fundamental. New and existing organizations should regularly undertake data security review to ensure that data is safe from any loss. The three predominant principles of information protection are confidentiality, integrity, and availability.

One of the main challenges that face numerous firms even before securing the classified information is the classification of the information. It is vital to note that despite the importance of the information in the organization, all the information cannot be treated in the same way. Organizations should maintain a sustainable and clear policy of information classification. Some of the major issues that should be included in the policy include identifying the individual who assigns the original classification once the data is created, the person responsible for storing the data, and the process for declassifying information among other duties (Pipkin, 2000). Notably, the role of information classification should be limited to the Information Technology department but all the managers concerned should be involved. This is based on the fact that information that seems to be vital to a manager, for example, in the marketing department may not be important to a manager in the maintenance department. This implies that individuals or department that understands the importance of the information should be fully involved in the classification. The information handling policy and methods of maintaining data cannot, therefore, be overlooked to avoid making the software and hardware&nbsp.less effective.

In an organization, there is major information that should only be accessed by authorized individuals and which should be stored on the internal network only.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question