Question

In: Computer Science

Protecting Information What is the mindset required to properly protect information? What role does reasoned paranoia...

Protecting Information

What is the mindset required to properly protect information? What role does reasoned paranoia play in this mindset and how can an individual keep the proper balance between protecting information and enabling business?

Solutions

Expert Solution

Information nowadays is quite a wide term with the introduction of Laptops, Mobiles, Internet of Things etc, Every other daily product is getting online and the vulnerabilities of leaking information are increasing with it. In this digital age when most of the things are incorporated with some kind of intelligence, they are programmed and connected to the network. Not many individuals expect that the Network or the Device can be over ridden and throw you in series of problem. E.g An Online Home security system, Imagine a system like this getting overridden and giving access to Burglars an easy accesses to your valuables. A lot can be at stake if the Networks are not Firewalled and the secure data is not isolated.

To aim for a secure network or Information protection the an individual should build a Perimeter, classify the data and secure them at different security level. Firewalls and advanced Intrusion detectors should be used. Awareness of security should be provided to the users so that no Loophole is detected for a possible breach. Enforce security rules on everyone equally. Follow layered security practices.

Being Paranoia about security is good as you will be always updated about the security practices being followed. Paranoia is dysfunctional trait but it isn’t defined like this in the topic. But being updated with the security methods and practices is the only way of ensuring security leaks.

To enable a secure system without affecting the business is also difficult as the access to the information becomes restricted and many processes and approvals come in way that increase the lead time. So a proper balance should be adopted where the business is not affected by long processes neither is the security. Data classification and Backup should be enforced where you layer the security level required for each information and device separate process levels for each of them.


Related Solutions

what does "mindset" mean
what does "mindset" mean
What role does properly assessing our resources and strengths/weaknesses have in having a proper foundation as...
What role does properly assessing our resources and strengths/weaknesses have in having a proper foundation as a Christian business leader.
What role does information play in a company's strategy?
What role does information play in a company's strategy?
What populations are considered vulnerable? What is considered your role as the researcher in protecting vulnerable...
What populations are considered vulnerable? What is considered your role as the researcher in protecting vulnerable populations?
Who does protectionism protect and what /who does it protect them from? Who does protectionism hurt...
Who does protectionism protect and what /who does it protect them from? Who does protectionism hurt and how does it hurt them? Not hand writhing. Please do typing the answers.
What role does information technology play in Walmart and Amazon?
What role does information technology play in Walmart and Amazon? How is it helping them refine their business strategies?
What does trade secret law protect?
What does trade secret law protect?
What role does information and information technology play in successfully competing with other companies in a...
What role does information and information technology play in successfully competing with other companies in a given market?
What is an information asset and what measures and controls exist to protect it?
What is an information asset and what measures and controls exist to protect it?
The Chief Information Officer wants to ensure they are investing properly in information assurance. What are...
The Chief Information Officer wants to ensure they are investing properly in information assurance. What are some metrics should the Chief Information Security Officer advise the organization monitor? How would these metrics help to identify the cost / benefits, or the return on investment?. What are some caveats that might exist to the metrics you suggest? ( the course is called cybersecurity management)
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT