We're Open
+44 7340 9595 39
+44 20 3239 6980

[Solved]Case Overview of Security Issues

  100% Pass and No Plagiarism Guaranteed

[Solved]Case Overview of Security Issues

Case Overview of Security Issues


Module 1 - Case


Assignment Overview

According to Pesante (2008) there are three basic security concepts that are important to information on the Internet. Those are: confidentiality, integrity, and availability. In addition, she indicates that there are three additional concepts relating to the people who use information which are authentication, authorization, and nonrepudiation. Please read the full article that explains these concepts.

Pesante, L. (2008). Introduction to Information Security. Retrieved from the World Wide Web on 05/20/09 from http://www.us-cert.gov/reading_room/infosecuritybasics.pdf

Solutions to achieve information security are multi-faceted and require collaborations from multi-parties. It is not easy to assure information security, such as in the dimensions mentioned above. The following article broadens one`s views on security. Even though it focuses on the protection of infrastructure, one can learn from its methods of approaching security to solve other kind of security problems. It is a long article. You don`t need to read word-by-word. Please focus on the key concepts.

White House. (2009). Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure. White House.

The following essays are much shorter and easier to read. They offer different perspectives and especially with unique views on the role of the government.

Schneier, B. (2012), The Big Idea: Bruce Schneier. February 2012.

Gonsalves, A. (2012), RSA 2012: Three Greatest (and Surprising) Internet Security Dangers, CRN.

Case Assignment

Prepare a 3- to 4-page paper addressing the question:

"How to Achieve Business Information Security in Cyperspace?"

Assignment Expectations

Use information from the modular background and case readings as well as any good quality resource you can find. Please cite all sources and provide a reference list at the end of your paper.

The following items will be assessed in particular:

Your ability to consolidate ideas from reading materials.

Your demonstration of your understanding of various dimensions of IT securities and available IT security solutions.

Your ability to apply your understanding in national security policy in cyberspace to a business or an organization.


Module1- Case Overview of Security Issues Name Institution Module1- Case Overview of Security Issues The Internet is a collection of millions of computers in a lightly interconnected networks that are accessible to individual computer users. This means that the internet or cyberspace offers the convenience and easy access of information. However, with this convenience also comes various security risks when dealing with virtual information. Among these risks is the danger of information being stolen, altered, or even misused. However, there are things that businesses can do to achieve information security in cyberspace (Pesante, 2008). First, it is crucial for businesses or firms to train their employees on the risks and security principles. Employees remain the initial line of defense when there is risk of malicious activities on their work computers. The idea is to ensure that they understand basic security principles and standards such as the need for strong passwords. The firm need to est


100% Plagiarism Free & Custom Written,
Tailored to your instructions

International House, 12 Constance Street, London, United Kingdom,
E16 2DQ

UK Registered Company # 11483120

100% Pass Guarantee


View our samples written by our professional writers to let you comprehend how your work is going to look like. We have categorised this into 3 categories with a few different subject domains

View Our Samples

We offer a £ 2999

If your assignment is plagiarised, we will give you £ 2999 in compensation

Recent Updates


  • Title: [Solved]Case Overview of Security Issues
  • Price: £ 89
  • Post Date: 2021-10-28T12:27:39+00:00
  • Category: Essays
  • No Plagiarism Guarantee
  • 100% Custom Written

Customer Reviews

[Solved]Case Overview of Security Issues [Solved]Case Overview of Security Issues
Reviews: 5

A masterpiece of assignment by , written on 2020-03-12

I received my order last night and now I’m writing my reviews. My assignment has all the points I needed along with a good style. The citations used are relatable and professional. The best thing is the discount I got because I recommended my friend too to use their service. I am so pleased to use this effective service. The features are also amazing, everything is good. Will come again soon!
Reviews: 5

A masterpiece of assignment by , written on 2020-03-12

Insta Research is a very helpful place to buy a resume in the first place. I gave them my details and did not expect that they would come up with such an exclusive design. My personality is professionally enhanced through the resume made by them. I am thankful for the depth of my heart as I would have never approached that level of excellence in my resume. Wish you good luck ahead and again thank you!