Home Project-material DESIGN AND IMPLEMENTATION OF E-SECURITY SYSTEM FOR COORPERATE INFORMATION ORGANIZATIONS

DESIGN AND IMPLEMENTATION OF E-SECURITY SYSTEM FOR COORPERATE INFORMATION ORGANIZATIONS

Dept: COMPUTER SCIENCE File: Word(doc) Chapters: 1-5 Views: 4

Abstract

This study provides a review in cooperate information system security approaches either physical or electronic in nature. Although, the benefits and uses of the physical information system security (ISS) approaches are valuable, there is still a need to investigate the alternative electronic approaches or at least, to find a way to combine them in a more appropriate and thus successful way. In doing so, this paper presents the available methods and techniques in information systems security in an attempt to shed more light into these electronic system approach and how it can be used to benefit our corporate information system security. First this paper provides the definition of electronic security and explains why these issues deserves attention. Next, it presents and discusses the various electronic security vendors and their mode of operation. Then, it develops a risk-management framework for understanding the inherent risk in the electronic security infrastructure. It also provid

CHAPTER ONE

                                               INTRODUCTION      

1.1Background of the study                                       

       “Is it a fact that by means of electricity, the world of matter has become a great nerve, vibrating thousands of miles in breathless point of time? Rather the globe is a vast head, a brain, instinct with intelligence! Or shall we say it is itself a thought nothing but a thought”

          Even before the event of September 11, electronic security was a growing area of concern for bank and other financial services providers in managing daily operational risk. Now, because of the rapid growth in wireless technology and its increasing use in providing financial services in emerging market, either in coordination with the internet or on a freestanding basis, there is even more demand for a careful look at issues related to electronic security.

Electronic security is the use of electronics means to exchange information or to transfer sighs and representation of values and to execute transactions in a commercial environment. E-security can be described on one hand as those policies, guidelines, processes and action needed to enable electronic transactions to be carried out with a minimum risk of breach, intrusion, or theft. E-security is any tool, techniques, or process used to protect a system’s information asset. The degree of e-security used for any activity should be proportional to the activity underlying value, thus, security is risk management tool or risk mitigation tool, and an appropriate security means mitigation of the risk for the underlying transaction in proportion to its value.

          The need for security is a constant of doing business over the internet because, in essence, the internet is a broadcast medium. E-security enhances or adds value to a naked network and is composed of both a “soft” and a “hard” infrastructure. Soft infrastructure component are those policies, processes, protocols, and guidelines to create the protective environment to keep the system and data from compromise while the hard infrastructure are the actual hardware and software needed to protect the system and its data from internal and external threats to security.



Recent Project Materials

Abstract migration norms is defined as all policies and laws that govern the movement of people from one cou...
Word(doc) 1-5 46 Read More
Abstract A study on the removal of lead from soil samples in zamfara using modified kaolinite clay was studi...
Word(doc) 1-5 12 Read More
Abstract The study examines the impact of Corona Virus on small and medium scale enterprises in Nigeria. CO...
Word(doc) 1-5 16 Read More
Abstract Weed flora of different management techniques under different cropping systems have been reported b...
Word(doc) 1-5 6 Read More
View More Topics

Browse by Departments