Question

In: Economics

Discuss telecommunication operations and three (3) security measures to ensure     protection of information.

Discuss telecommunication operations and three (3) security measures to ensure     protection of information.

Solutions

Expert Solution

Telecommunication is the transmission of information in the form of messages,audio and video by electronic media like wire,optical fiber,satelites,radio & internet. Telecommunication system consists of two stations, one is transmitter & another is receiver.

In a telecommunications circuit data is transmitted through an electrical signal termed as carrier wave. When carrier wave transmits the information, it needs some modulation,i.e., it may be analog or digital. However, today's telecommunication system is dependent on Internet Protocols(IPs) to transmit data.

Three security measures to ensure protection of information:

1) Find out the exact access,usage & information distribution policies: After accessing the risk, an organisation can plan the distribution policies for different types of secrect information. Here the authority gives permission to some people who can access the particular information & simultaneously take actions if the rules are violated by the people who access the information.

2) Implement a strong monitoring system: In order to protect information it is necessary to implement an effective monitoring system. Control units must be established to monitor information usage & actions should be taken incase of violation of those policies.

3) Review the system periodically : It is also important to review the system whether the policies & rules are properly working or not. Reviewing the system is also important as implementing the policies.Through reviewing the system the organisation can protect other important information & expand security system to different communication channels.

Protecting information should not be a one time task, it should be a continuous process. Through regular monitoring system the confidential information can be protected all the time.


Related Solutions

Discuss the best type of network and protocol to use in organizations to ensure protection of...
Discuss the best type of network and protocol to use in organizations to ensure protection of customer information. Justify your selection with specific reasons, facts, and examples.
1. Give examples of security measures that might be used to control information security, personnel security,...
1. Give examples of security measures that might be used to control information security, personnel security, and health hazard security issues. 2. Should the federal and state governments enact tougher laws or regs to deal with security violators? If so, what are your recommendations?
Discuss the measures that can be put in place to ensure that the weakening rand does...
Discuss the measures that can be put in place to ensure that the weakening rand does not affect growth negatively.In your discussion highlight the importance of the balance of payments,policy around competition,South africas economic strategy in relation to exports and imports and a possible diversification strategy.
Question 2 Discuss the measures that can be put in place to ensure that the weakening...
Question 2 Discuss the measures that can be put in place to ensure that the weakening rand does not affect growth negatively. In your discussion, highlight the importance the following-the balance of payments, policy around competition, South Africa’s economic strategy in relation to exports and imports and a possible diversification strategy.      [20 Marks]
discuss any three psychological approaches to launch an information security attack.
discuss any three psychological approaches to launch an information security attack.
This week in Chapter 3 we read about three different security measures of HIPPA: administrative, physical,...
This week in Chapter 3 we read about three different security measures of HIPPA: administrative, physical, and technical standards. Briefly describe each and give an example. Your answer must be at least 250 words in length
1 a)Define food security and discuss THREE (3) dimensions that characterize food security.    b) Food...
1 a)Define food security and discuss THREE (3) dimensions that characterize food security.    b) Food self-sufficiency is defined as the extent to which a country is able to satisfy its food needs from its own domestic production. List and explain FOUR (4) factors that pose challenges to Small Island Developing States achieving food self-sufficiency.
Discuss three main information security challenges faced by organizations. Focus on prevention and troubleshooting.
Discuss three main information security challenges faced by organizations. Focus on prevention and troubleshooting.
The BEST way to ensure information security efforts and initiatives continue to support corporate strategy is...
The BEST way to ensure information security efforts and initiatives continue to support corporate strategy is by: A. including the CIO in the information security steering committee B. conducting benchmarking with industry best practices C. including information security metrics in the organizational metrics D. performing periodic internal audits of the information security program Correct Answer: C????? or D?????????????? ______________________ Note ■ Some experts claim that the correct answer is: "C. including information security metrics in the organizational metrics" ■ Other...
The HIPAA privacy and security rules provide federal protection for individually identifiable health information. Consider a...
The HIPAA privacy and security rules provide federal protection for individually identifiable health information. Consider a physician practice that is transitioning from being paper based to electronic medical records. The receptionist area contains both hanging folders and the desktop computer on which the practice management system runs. During the transition, a patient’s health information (valued asset) will exist in two states: on paper in a hanging folder and in an electronic record on a computer. Identify and evaluate the risks...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT