Information Security

Read Complete Research Material



Information Security

By

ACKNOWLEDGEMENT

My thanks go out to all who have helped me complete this study and with whom this project may have not been possible. In particular, my gratitude goes out to friends, facilitator and family for extensive and helpful comments on early drafts. I am also deeply indebted to the authors who have shared my interest and preceded me. Their works provided me with a host of information to learn from and build upon, also served as examples to emulate.

DECLARATION

I, (Your name), would like to declare that all contents included in this thesis/dissertation stand for my individual work without any aid, & this thesis/dissertation has not been submitted for any examination at academic as well as professional level previously. It is also representing my very own views & not essentially which are associated with the university.

Signature:

Date:

ABSTRACT

This research study is an attempt to explore the perception impact that strategies and risk have on the strategy of information security in the existing information technology. This research study has adopted a qualitative and a secondary research method in order to meet the aim and objectives of the research study. The board of directors has been interviewed in order to obtain their responses regarding the strategies and risks that are associated to information security. Security policies and training are important today because companies now rely heavily on information systems in almost every aspect of the business, making information security vital to corporate success. Information systems aid business strategy, organizational design, management control systems, the creation and maintaining of competitive advantages, and much more.s

TABLE OF CONTENTS

ACKNOWLEDGEMENTII

DECLARATIONIII

ABSTRACTIV

CHAPTER 01: INTRODUCTION1

1.1. Background of the Study1

1.2. Research Question3

1.3. Research Aims3

1.4. Research Objectives4

1.5. Layout of the Dissertation4

CHAPTER 02: LITERATURE REVIEW5

2.1. Introduction5

2.2. Information Security5

2.3. Based Research on IT Security9

2.4. Research on Economics of Information Security9

2.5. Top Management Support10

2.6. User Training11

2.7. Security Culture12

2.8. Information Security Policy13

2.9. Perceived Security Effectiveness15

2.10. Task Interdependence17

2.11. Information Security and Risk Management17

CHAPTER 03: RESEARCH METHODOLOGY20

3.1. Introduction20

3.2. Research Method20

3.3. Overview of the Qualitative Research20

3.4. Overview of the Secondary Research21

3.5. Research Philosophy21

3.6. Participants22

3.7. Ethical Considerations22

3.8. Confidentiality23

3.9. Informed Consent24

3.10. Reliability24

3.11. Validity25

3.12. Limitations of the Research26

3.12.1. Time Constraints26

3.12.2. Sample size26

3.12.3. Honesty of the Interviewees27

3.13. Literature Search27

3.14. Conclusion27

CHAPTER 04: DISCUSSION AND ANALYSIS28

4.1. Interview Analysis28

4.2. Secondary Analysis29

CHAPTER 05: CONCLUSION39

5.1. Critical Condition41

5.2. Recommendations42

5.3. Future Research43

REFERENCES44

CHAPTER 01: INTRODUCTION

1.1. Background of the Study

Information security, as well as protection of information, the task is complex, aimed at ensuring security, implemented the introduction of safety systems. The problem of information security is a multifaceted and complex and covers a number of important tasks. Information security problems are compounded by constant process of penetration into all spheres of public facilities and data processing and, above all, the computer systems. To date, set forth three basic principles that should ensure information security: data integrity - protection against failures, leading to loss of information, as well as protection from unauthorized creation or destruction of data; confidentiality of information; availability of information to all authorized users.

In the development of computer systems, failure or error in which can lead to serious consequences, issues ...
Related Ads