Research Paper On Information Security

Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.

  • Urban Baseball Stadium, Sporting Events, and Risk Management

    This 5 page report discusses various issues of risk management associated with using a municipal baseball stadium for sporting events by groups other than the teams directly associated with the stadium. The important elements of any risk management program include quality control, standards development, personal safety/injury, and information security. Those elements are equally important in the business of sporting events. Bibliography lists 4 sources.

  • Overview of Information Security Management

    A 10 page paper. In today's electronic world securing information is difficult and complex. There are so many ways in which security can be breached. This essay discusses why it is important for information managers to understand the many ways information can be compromised. The essay provides some specific examples and how to prevent these types of incidents. The writer also discusses the laws that are in place regarding computer abuse. Bibliography lists 8 sources.

  • Personal Home Information and Risk Management

    An 11 page paper discussing the risk to which personal information is subjected at home. Home is the primary repository for personal information for most people. The paper provides an inventory of the types of personal information held in a single home that also houses a business and a graduate student, followed by assessment of the risks to that information and a security plan intended to control those risks. The plan follows that of the “Risk Management Guide for Information Technology Systems,” Special Publication 800-30 of the National Institutes of Standards and Technology (NISTA), identifying information assets; assigning a loss value to each; and identifying vulnerabilities and the likelihood of each to arrive at a risk-rating factor for each item. The paper concludes with a security plan for those items at greatest risk. Bibliography lists 2 sources.

  • Risks, Structure, and Security Management

    (8 pp) The complexities of modern society have combined to generate a variety of threats to business organizations, information networks, military installations, government operations, and individuals. For information technology, information is the core of its existence. Anything that threatens information or the processing of the information will directly endanger the performance of the organization. Whether it concerns the confidentiality, accuracy, or timeliness of the information, the availability of processing functions or confidentiality, threats that form risks have to be countered by security. That means there are structural risks. Structural risks require structural security. Bibliography lists 5 sources.

  • Global Data Security

    A 12 page paper that begins with a report of electronic security breaches, followed by a discussion of the global security market and trends within that market. The essay then introduces a global security company and outlines a business unit structure and a geography matrix map, which is limited, and discusses how the company can gain a sustainable competitive advantage. Using health/medical data and information, the writer discusses concerns in the global security industry with comments about the U.S., UK, Australia, Canada and New Zealand. The writer then makes a recommendation for the global security company in terms of greater global expansion. Bibliography lists 11 sources.

Copyright © 2000-2021 The Paper Store Enterprises, Inc. & Fast Papers On-line.
All rights reserved. Search for your essay here.

U.S. based premium essay, research and
term papers service since 2000.