AW Week 1 Chapter 1 assignment 5600
docx
keyboard_arrow_up
School
Raunaq-e-Islam Govt. College for Women, Karachi *
*We aren’t endorsed by this school
Course
200
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
8
Uploaded by JudgeAtom9890
1
WEEK 1
CHAPTER 1
ASSIGNMENT
REGISTRATION NUMBER:
NAME OF INSTITUTION:
NAME OF COURSE:
NAME OF INSTRUCTOR:
DATE OF SUBMISSION:
2
ASSIGNMENT
QUESTION 1:
What is the defining difference between computer security and information security?
Computer security and information security are closely related concepts, but they have distinct
focuses within the broader realm of cybersecurity.
Computer Security:
Computer security primarily concerns itself with protecting the hardware, software, and data
within a single computing device or system. It is often more technical and centered around
safeguarding the integrity, confidentiality, and availability of a specific computer or network.
Computer security measures might include firewalls, antivirus software, intrusion detection
systems, and encryption methods designed to prevent unauthorized access, data breaches, and
malicious attacks on individual computers or local networks (Olcott, 2019).
Information Security:
Information security has a broader scope and encompasses the protection of all forms of sensitive
and valuable information, regardless of the medium or location. This includes data stored on
computers, transmitted over networks, or even in physical formats like paper documents.
Information security is concerned with ensuring that information remains confidential, accurate,
and available to authorized users when needed. It encompasses a wider range of policies,
procedures, and technologies that address risks related to data privacy, data breaches, compliance
with regulations, and more. Information security also involves educating users about best
3
practices for handling information securely and managing risks associated with information
sharing and storage (Olcott, 2019).
In essence, computer security is a subset of information security. Information security takes a
holistic approach to protect all forms of sensitive information across various platforms and
channels, while computer security focuses on safeguarding the specific computing systems and
devices that process and store that information.
QUESTION 2:
Why can we argue that information security is really an application of social science?
Information security is more than just a technical matter; it involves a complex interplay of
human behavior, psychology, culture, and communication. This is why it can be argued that
information security is closely tied to social science. Here are some reasons why:
1.
Human Behavior and Psychology:
A significant portion of information security
vulnerabilities and breaches are caused by human actions, such as falling for phishing
attacks, sharing sensitive information inadvertently, or neglecting security protocols.
Understanding human behavior, decision-making processes, and psychological factors
that influence how people interact with technology is crucial for designing effective
security measures and training programs (Galarita, 2022).
2.
User Education and Awareness:
Educating users about security risks and best practices
requires effective communication strategies. Social science principles help in designing
training materials that are accessible, relatable, and engaging for different audiences.
Information security professionals need to consider how users perceive and respond to
security practices and policies (Galarita, 2022).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
3.
Social Engineering Attacks:
Social engineering is a technique where attackers
manipulate individuals into divulging confidential information or performing actions that
compromise security. These attacks exploit psychological traits like trust, fear, and
urgency. Knowledge of social science helps security experts anticipate and counter these
tactics effectively.
4.
Culture and Organizational Behavior:
Different cultures and organizational structures
influence how people perceive and prioritize security. Applying social science concepts
helps tailor security policies and strategies to fit specific cultural contexts and
organizational norms (Galarita, 2022).
5.
User-Centered Design:
Effective security solutions should be user-friendly and align
with users' needs and habits. Applying principles from social science disciplines like
human-computer interaction (HCI) helps create interfaces that are intuitive and encourage
secure behavior (Galarita, 2022).
6.
Compliance and Governance:
Information security often involves compliance with
legal regulations and industry standards. Understanding how regulations impact
organizational behavior and how employees interpret and comply with rules requires
insights from social science (Galarita, 2022).
7.
Risk Perception and Communication:
Assessing and communicating risks is a crucial
aspect of information security. People's perception of risk is influenced by various
cognitive biases and social factors. Social science helps security professionals craft risk
messages that resonate with users and drive desired behavior (Galarita, 2022).
8.
Insider Threats:
Insider threats arise from employees or individuals within an
organization. Understanding employee motivations, job satisfaction, and grievances
5
requires insights from organizational psychology to mitigate the risks posed by insider
threats (Galarita, 2022).
9.
Behavioral Change Strategies:
Encouraging users to adopt secure practices often
involves behavior change interventions. Social science provides frameworks and
strategies for influencing behavior and fostering long-term security-conscious habits.
10. Privacy Concerns:
Privacy is an integral part of information security. Balancing security
needs with individual privacy expectations involves understanding privacy preferences
and sociocultural factors (Galarita, 2022).
In conclusion, information security extends beyond technical measures and involves
understanding how humans interact with technology, how they make decisions, and how they
respond to security measures. The insights provided by social science disciplines are essential for
creating holistic and effective information security strategies that encompass both technological
and human aspects.
QUESTION 3:
A globally interconnected commercial world has emerged from the technical advances that
created the internet. Has its creation increased or decreased the need for organizations to
maintain secure operation of their systems? Why?
The creation and growth of the internet have significantly increased the need for organizations to
maintain secure operation of their systems. There are several reasons for this:
1.
Increased Connectivity:
The internet has interconnected organizations on a global scale,
allowing for seamless communication, collaboration, and transactions. However, this
connectivity also means that potential threats and attacks can come from anywhere in the
6
world. Organizations need to secure their systems not only against local threats but also
against those originating from various geographical locations.
2.
Global Data Exchange:
Organizations now exchange vast amounts of sensitive data
over the internet, including customer information, financial data, intellectual property,
and proprietary business information. The risk of data breaches and unauthorized access
has grown significantly, emphasizing the need for robust security measures to protect this
valuable information (Chatterjee, 2020).
3.
Evolving Threat Landscape:
As the internet has evolved, so too have cyber threats. The
range and complexity of cyberattacks have increased, including malware, ransomware,
phishing, and other social engineering attacks. The interconnected nature of the internet
means that a single successful attack can have widespread implications, necessitating
strong security measures.
4.
Remote Work and Mobile Devices:
The internet has facilitated remote work and the use
of mobile devices for business operations. While this offers flexibility, it also introduces
additional security challenges, as these devices can be more vulnerable to attacks if not
properly secured.
5.
E-Commerce and Online Transactions:
The growth of e-commerce and online
transactions has led to an increased reliance on online payment systems and sensitive
financial data. Organizations must ensure the security of these systems to protect both
their customers' trust and their own reputation (Chatterjee, 2020).
6.
Regulatory Compliance:
The internet has brought about various regulations and
standards governing data privacy and security, such as the General Data Protection
Regulation (GDPR) and the Health Insurance Portability and Accountability Act
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7
(HIPAA). Organizations must comply with these regulations to avoid legal and financial
consequences.
7.
Reputation and Trust:
With the internet's global reach, news of security breaches
spreads quickly and can damage an organization's reputation. Maintaining secure systems
is crucial for building and maintaining customer trust.
8.
Business Continuity:
The internet has become a critical infrastructure for business
operations. Downtime or disruptions due to cyberattacks can lead to significant financial
losses and operational disruptions (Chatterjee, 2020).
9.
Cloud Computing and Third-Party Services:
Many organizations rely on cloud
services and third-party vendors for various aspects of their operations. While these
services offer benefits, they also introduce potential vulnerabilities that must be managed
and secured.
In summary, the emergence of the globally interconnected commercial world driven by the
internet has significantly increased the need for organizations to maintain secure operation of
their systems. The expansion of connectivity, data exchange, evolving threats, regulatory
requirements, and the potential consequences of security breaches all underscore the importance
of strong cybersecurity measures in today's interconnected business landscape (Chatterjee, 2020).
8
References
Chatterjee, R. (2020, March 5).
Difference Between Cybersecurity & Information Security
.
Analytics India Magazine.
https://analyticsindiamag.com/difference-between-
cybersecurity-information-security/
Galarita, B. (2022).
Information Security vs. Cybersecurity: Explaining The Difference – Forbes
Advisor
. Www.forbes.com.
https://www.forbes.com/advisor/education/information-
security-vs-cyber-security/
Olcott, J. (2019).
Cybersecurity Vs. Information Security: Is There A Difference?
BitSight.
https://www.bitsight.com/blog/cybersecurity-vs-information-security