Explore BrainMass

Informatics and Security

Informatics and security is a general term that can be used to cover all data, regardless of its form (electronic or physical) that needs protection. There are two major strands of information security.¹ IT security is sometimes called computer security. It is defined as information security applied to technology. IT security specialists are found in major businesses because the nature and value of data within large businesses is enormous. IT security specialists are responsible for keeping technology in a company secure from cyber attacks.

Information assurance is protecting data to ensure that it is not lost when systems fail. Systems may fail when there is a natural disaster, a server malfunctions, or there is physical theft of computer devices. One of the best ways to ensure data security is to have an off-site backup. Governments, military, corporations, financial institutions, and hospitals collect a huge amount of personal and sensitive information about their employees, customers, and other sensitive information. If this information is leaked, it could lead to personal or staff exploitation, fraud, theft, and confidential information leaks.

Protecting confidential information is a business requirement, sometimes required by law and always ethical. Hence, information security is an expanding industry, and there are many areas of specialization. Some of these areas include securing networks, securing applications and databases, security testing, information systems auditing, and digital forensics. One of the core principles of information security is the CIA triad (not to be confused with the Central Intelligence Agency). The CIA triad consists of confidentiality, integrity, and availability.² Some debate that other principles, such as accountability and legality, should be added to the principles of information security.² The Organization for Economic Cooperation and Development published nine accepted principles of information security. These are awareness, responsibility, response, ethics, democracy, risk assessment, security design and implementation, security management, and reassessment.³


1. Title 44 of the United States Code. Retrieved from
2. Perrin, Chad. (June 30, 2008). The CIA Triad. Retrieved from 

3. OECD. Retrieved from

Identity Management

Why is Identity Management (IDM) a critical issue right now for organizations? Find an organization that uses IDM or is in the process of implementing and describe some of the benefits and costs that are being provided to the organization. How would you go about implementing IDM within an organization?

Experimentation and innovation

What do you feel is the best way for a company to transition from experimentation to innovation? Explain. Give an example of a company which transitioned successfully and one which did not. Discuss resource allocation to execute IT experimentation and development plans. Explain the characteristics of collaboration within y

Digitized data collection systems

Companies that use digitized data collection systems generate information that can provide many knowledge nuggets dealing with customer buying preferences. One issue that is contentious with employers is ownership of that information. Companies have employees that work with that information on a daily basis. 1) What can e

Understand how organizations enhance systems to compete globally

QUESTION 2 The purpose of this module's main topic is to help you synthesize your cumulative knowledge and understanding of the material presented in the module. Concept application is important to understand how organizations enhance systems to compete globally. Please consider the following. Define the difference between

Securing a network

Securing a home wireless network makes it difficult for uninvited guests to connect through your wireless network. Create a document detailing how you can secure a home wireless network. just around 500 words will be ok.

Outsourcing: long term costs

Outsourcing can appear too good to be true, and some of the benefits of outsourcing can be outweighed by its long-term costs. Conduct some research on the advantages and disadvantages of outsourcing. Using what you learned from your research, discuss an example of how the benefits of outsourcing are outweighed by its long-term c

The importance of business process management

In this writing assignment, you will explore how organizations use business process management (BPM). Write a one page (250-word) paper explaining how organizations use business process management (BPM) and address the following in your paper:  What is business process management (BPM)?  Why do processes need management

Internet presence for a small retail hand-made wooden goods

In 580 words, please Introduce and conclude an Internet presence for a small retail hand-made wooden goods, jewelry, home decorative specialty-goods business. such as : - Connecting to Social Madia (Facebook Twitter, Pintress etc,..) - Web server (e.g., IIS, Apache) and Script libraries other software that needs to be install

Data Warehouse versus Data Mart

Data Warehouses and Data Marts Write a one- to two-page (250-500 word) paper that discusses the differences between data warehouses and data marts. Also, discuss how organizations can use data warehouses and data marts to acquire data. Please include references.

RFID: Growth in Business

RFID has seen an enormous growth in business. For example, Wal-Mart has been a big user of the technology. Discuss the importance of RFID to accounting information systems: 1- Who uses it, and what are it's benefits? 2- What security issues does it pose for accounting systems?

OR problems using LP and IP

1. (P2-38) The production department for an aluminum valve plant is scheduling its work for next month. Each valve must go through three separate machines during the fabrication process. After fabrication, each valve is inspected by a human being, who spends 15 minutes per valve. There are 525 inspection hours available for the

Information Management

What do you think about Ying's approach (See attached file) to the automation of classifying information content for the purpose of managing that information? Does the approach scale for large organizations? How would you try to improve on his approach if it were to be applied in your current work situation? (About 300 words)

Security, CSO, ERM, Centralized Governance, & Sarbanes-Oxley Act

75 word minimum response required. • Credible reference materials, including your course textbook(s), may be used to complete the assessment. o If you have questions regarding the credibility of your reference, please contact your professor. • APA Information o In-text and reference citations are required for all writt

Emerging IT Trend

Which emerging IT trend is currently impacting your business or could impact your business in the future? Should your organization respond by being an early adopter or wait to see what transpires? What are the risks involved? What might be other considerations regarding this technology trend?

Information Systems: Issues

Information is data that is framed in a specific context. In this sense, information is contextual data that has a level of inherent value. Data might be the binary 0s and 1s on a hard drive, but information is the combination of that binary data into a document, media file, or database. Therefore, information systems are method

Research Benefits of Using Databases

Research organizational benefits of using databases and DBMS's. Post at least two reasons organizations use databases and DBMS's. Post one advantage a database has over a spreadsheet.

Why Format a Word Document?

What might be some challenges in formatting a document? What are the added values in formatting a documenting? What new feature (s) enhanced your ability to better format your documents.

Mobile Computing: Security Risks

As capabilities and functionality are added to devices, the differences between PC, e-reader, smartphone, and PDA gets blurred. For the discussion below, we will rely on current trends in terminology and categorization, but recognize that as mobile hardware evolves, new categories will emerge and traditional categories will beco

Social Engineering and Hacking

Malware creators have used social engineering to maximize the range or impact of their viruses, worms, etc. For example, the ILoveYou worm used social engineering to entice people to open malware-infected e-mail messages. The ILoveYou worm attacked tens of millions of Windows computers in May 2000 when it was sent as an e-mail a

Information Security Incident Factors

The Information Security Forum (, a self-help organization that includes many Fortune 100 companies, compiled a list of the top information problems and discovered that nine of the top ten incidents were the result of three factors: - Mistakes or human error - Malfunctioning systems - Misunderstanding the ef

Procurement in a Telecom Setting

Why the procurement portion of the telecom project is going to be sourced out (or buy)? What is the pros and cons of making (or keeping within the project team to do) versus sourcing out? What is a financial and schedule deadline justification?

Anti-Malware Techniques

I need some assistance in describing and explaining six anti-malware technique, with references.

Measure Value of IT in an organization

Recommend various components that may be used to measure the value of an IS and IT department to a company. Include the following: Metrics that measure the effectiveness of IS and IT. Also, metrics that measure their efficiency and the difference between metrics of effectiveness and efficiency Methods used to measure

Question about Information Systems Management

I need help in defining and analyzing the following terms associated with information systems management (ISM): Information Systems Management Business intelligence Enterprise resource planning (ERP) Customer relationship management (CRM) Data mining Intelligent systems

IT Governance and Internal Controls

1. Define and discuss examples of physical and logical security measures often used by organizations in computer operations. 2. Here are five organization level controls related to IS/IT. Define and give examples for at least two. (1) personnel policies; (2) file security controls; (3) business continuity planning; (4