Security Considerations For Em's Bakeries Ltd.

Read Complete Research Material

SECURITY CONSIDERATIONS FOR EM'S BAKERIES LTD.

Security Considerations for Em's Bakeries Ltd.

Security Considerations for Em's Bakeries Ltd.

Introduction

The importance of security cannot be denied from the world of computing as computers are used not only in homes but many businesses and government organisations use computer to store and process their data (ISO/IEC 27002, 2005). Computer security can be defined as a process that prevents access to information by an unauthorised user (Konheim, 2007). In fact, computer security plays an important role in detecting any access to the information by someone who is not authorised to access it. No doubt, the subject of computer or information security has received a widespread attention from hi-tech researchers and professionals as the emergence of internet has brought many security challenges to computer users as well as researchers. It can be seen that emergence of internet has provided huge number of users a platform to share their information and data (Oppliger, 2011). This means, the development of this shared platform also came with an opportunity to make unauthorised access to available information on the internet.

Further, security breach and information theft has also been a great concern of many businesses as organisations face security incidents that bring significant damage to any organisation (Oppliger, 2011). It is important to understand that nature as well as design of this shared infrastructure is very complex where it becomes difficult to protect information from theft. It would not be wrong to say that every business today has concerns about its information security as companies cannot afford any security breach. In fact, every breach in security brings serious and negative outcomes to the company if trade secrets are stolen, personal information is revealed, etc. This suggests that it is an urgent need of time to realise the importance of cryptography and implement most effective security techniques and technologies in order to protect personal as well as business information (Oppliger, 2011).

Computer/Information Security

Human beings always have tendency to access information whether it is related to them or not. This also occurs on computer networks as many users attempt to access information that is not meant to them (Hazay & Lindell, 2010). No doubt, information is a valuable asset for any individual or company that they use to receive further benefit. Information security protects not only protects that information but also provide protection to facilities and machines that process and store information with an aim to increase the value of that information. It is also important to know that information security increases the value of information by using two characteristics (ISO/IEC 27002, 2005):

Scarcity: that is related to the information outside the company.

Shareability: that focuses on the sharing of information within a company.

It would be fair to say that value of any information or data is determined by controlling these two characteristics. There is no doubt about the fact that information security aims to preserve information, which can be achieved by identifying correct method and level of above mentioned characteristics.

Similarly, researchers also discuss about social engineering and argue ...
Related Ads