Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

The final project will entail the development of a detailed report on InformationSecurity as it pertains to Small-to-Medium sized Businesses. Your report should be from 16 to 18 pages (double space)...

1 answer below »

The final project will entail the development of a detailed report on InformationSecurity as it pertains to Small-to-Medium sized Businesses.
Your report should be from 16 to 18 pages (double space) of researched content with at least 8 to 10 references. Use APA formatting for your report.
Pick 1 or suggest one to the instructor and get approval PRIOR to working on the project:    Comment by Raul Prado: Still need to ensure my topic is good for the professor just need quote.
1. Background of Information Security
2. Recent problems for small-to-medium businesses in Information Security
3. Physical Security for the small-to-medium business
4. Hardware Security for the small-to-medium business
5. Software Security for the small-to-medium business
6. Methods to protect information on the We
Internet
Requirements for the graduate project include
1. Development of a double-spaced paper using APA formatting(see number of pages required above for undergraduate or graduate work).Use proper in- text APA citations as well as a full References section. See APA for example
2. A minimum number of outside references for your work (see above note pertaining to undergraduate or graduate minimum resources required). APA
3. A matching PowerPoint presentation of your project. Do not simply cut and paste your report in PowerPoint. The PowerPoint is expected to be a usable presentation. Include PowerPoint speaker notes in your presentation (see the PowerPoint help feature if you are not familiar with this). Provide a reference section on the last slide of you
4. Record audio along with your presentation. Consider software like Screencast-o-matic or other free software that will record your PowerPoint and voice na
ation. Save as an MP4 file type and upload to the course    Comment by Raul Prado: I could take care of this. Unless you guys have a way that I can present the project as they know my voice.
Answered 3 days After Dec 03, 2021

Solution

Sayani answered on Dec 06 2021
114 Votes
Running Head: INFORMATION SECURITY                        1
INFORMATION SECURITY                                 16
INFORMATION SECURITY AS IT PERTAINS TO SMALL-TO-MEDIUM SIZED BUSINESSES
Table of Contents
Introduction    3
Background of Information Security    3
Recent Problems from Small to Medium Business in Information Security    5
Physical Security for the Small to Medium Businesses    6
Hardware Security for the Small to Medium Businesses    8
Software Security for the Small to Medium Businesses    10
Methods to Protect Information on the We
Internet    12
Conclusion    14
References    15
Introduction
Information security means to protect the information as well as the information system from the unauthorized access, use, disclosure, disruption, modification, or destruction in any order to provide integrity, availability as well as confidentiality. Information is such a thing, which needs high protection from the hackers or related persons who always remain in a search to steal important and confidential information and exploit the computer system and the network in order to gain access.
Through information system, it reduces the risk of the data that gets attack in the IT system (No
ekov, 2020). This report would highlight the benefits of information security, recent problems for small-to-medium businesses in information security and finally methods to protect information on the we
internet.
Background of Information Security
Information is such a thing that needs high protections as it has the high chance to be exploited by the competitors or the revengers. Security is primarily the practice of preventing unauthorized access, over the information and creates a safe guard su
ounded by it. With the help of security, the information remains protected from these co
upted or unauthorized section, which as a result helps any business or other organizational farms to reduce the hacking rates.
The combination of these three components is also known as the CIA Triad. The main goal of these three components is, firstly, with the confidentiality, organizations can prevent the unauthorized users in assessing the information by protecting the privacy of the information content. Secondly, integrity, which ensures the authenticity as well as accuracy of the information and thirdly, availability, ensures that the authorized users can assess the content of the information (Da Veiga, Astakhova, Botha & Herselman, 2020).
In any organizations, there exist different types of users, among which some users are acceptable whereas some are not. Certain users positively affect the organization; while on the other hand, some negatively affect the organization. Hence, in certain organizations some unauthorized users try to assess the crucial and important information and try to exploit them in order to satisfy their personal interest, whereas in certain organization some authorized users positively use the information for the betterment of the company and try to achieve the success.
Information security protects the data from the hackers whose main motifs are to ruin the information and make a copyright of it. There are usually three types of hackers, which includes white hat hacker, grey hat hacker and the black hat hacker. The black hat hackers are the one who hacks the malicious intent, the white hat hacker who is ethical hackers or rather save the organization from the evil hackers.
On the other hand, grey hat hacker is the expert who may sometimes violates the laws. Grey hat hacker enacts a blend of both of black as well as white hat activities. IT security is the world, which is controlled by white and black hat hacker world (Szczepaniuk, Szczepaniuk, Rokicki & Klepacki, 2020). As these days of pandemic, the hacking of the system and information security has increased a lot as most of the young teens are roaming here and there jobless and unemployed.
Due to Covid-19, the world is facing a huge crisis and leading an economic hardship, which are affecting them psychologically a lot. In order to survive in this struggle and hardship, they are selecting these criminal offenses and stealing the information in order to make the copyright and to sell them accordingly.
Information is such a thing, which needs high protection from the hackers or related persons who always remain in a search to steal important and confidential information and exploit the computer system and the network in order to gain access. Hence, protecting the information has become the most challenging aspect for every IT sector company in this pandemic where the hackers are roaming to control the information unauthorized and gets full access of it (El-Kenawy, Saber & Arnous, 2019).
Recent Problems from Small to Medium Business in Information Security
Information security means to protect the information as well as the information system from the unauthorized access, use, disclosure, disruption, modification, or destruction in any order to provide integrity, availability as well as confidentiality. However, in order to protect the information and provide a safe guard organization especially the small to medium organization has to face certain challenges and problems.
Firstly, the ransomware attack, which is one of the famous and well-known cybersecurity, challenges that almost organization faces. Ransomware attacks involve hacking into a user’s data and preventing them from accessing it until a ransom amount is paid. Through this ransomware attack, the attackers try to grab more money and for this, they do not release the data they stole from the organization until more money is paid (Sinha, Kumar Rai & Bhushan, 2019).
Secondly, IOT attack, where the devices include computing as well digital and mechanical devices that autonomously transit data, over a network. As the adoption of this kind of device include the mobiles, desktops, laptops and many more is increasing hence it becomes quite challenging for the business organizations to gain access over these devices which further open the door for other malicious attack (Rajendran, Nivash, Parthy & Balamurugan, 2019).
Thirdly, cloud services have now become popular and most of the individuals are now using these types of services for their personal as well as professional use. The attackers also use the cloud platform to hack the confidential information as well as expose the private secrets and exploit the organization. Fourthly, phishing attack is yet another major challenge faced by both small and medium businesses and this type of hacking include social engineering attack where the attackers steal users’ data through credit cards, or login into certain credential documents. Through this attack, the hackers can easily exploit the user’s data thoroughly until the user find about it.
Fifthly, through software vulnerabilities, the attackers usually catch up those files or information, which does not remain updated since months and these types of older software contain patches for security vulnerabilities that are fixed by the developers in the newer version. It sometimes becomes the tendency of the individuals or organization to keep the update activities pending or simply avoid the notification for future perspectives (Rot & Olszewski, 2017).
However, updating the software is one of the most important tasks that should be upgraded on the priority basis. Attack on the unpatched software version hence, becomes one of the major challenges in this regard. Apart from the above-mentioned attacks, the small and medium sized businesses often face hurdles in handling the information security systems due to the lack of awareness, financial capitals, unavailability of the resources and the increased threat advancements.
These hence lead to violation of the information and
ing to intellectual threats to the property and information extortion. As through information system, it reduces the risk of the data that gets attack in the IT system;...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here