Information Security-58861

The assignment need to a mind map consisting of 1250 words. there should be no paragraphs or sentences

Information Security

Contents

Introduction…………………………………………………………………………………………………………………….. 3

Background Information……………………………………………………………………………………………………. 3

Concept Map…………………………………………………………………………………………………………………… 4

Analysis………………………………………………………………………………………………………………………….. 5

Outcomes and Recommendation………………………………………………………………………………………… 5

Conclusion………………………………………………………………………………………………………………………. 6

References………………………………………………………………………………………………………………………. 7

Introduction

The information security or computer security is the main issue, which is shown in now days. Every day we saw in newspaper as well as listen to next people for that reason. Hackers, system virus, internet communication worm or threats are easily hack and stolen important information from the client computer or system, which is quite important for the client or customers as well as the stolen information, is so confidential for the client o the user of the system (Tipton & Krause, 2005). The cyber space or internet protocol communication is useful for the information gathering but as well as same by the help of the internet protocol communication all the threats are work or connected. If the threats are connected and run according to the hackers wants then all the useful information as well as useful data or information are lost easily and at the same time the hacker is easily access useful data or information of the client computer or user system. The hackers are connected with the client system or user computer by the help of the internet protocol communication and its own generating software or program. The hacker’s software or program is consist lots of malicious code by which they easily connected with the user computer or system and getting all the useful information as well as data and after that they destroy them according to its wanting.

Background Information

According to the case study, Robert is worry about its useful data as well as information, which is store is in its personal computer or laptop. Robert is customer’s manager in Bio Med Devices, which is situated in Perth, Western Australia. Basically Robert is travel in Western Australia for the customers support and contact with them. The main issue of the case study or Mr. Robert is that, they always connected with the internet communication services. Mr. Robert is most of the time connected with internet communication services by the help of its smart phone, iPad as well as computer system or new configures laptop. They really worry about all the information because in there devices they save all the useful information data like customers or clients contacts, customers dealing details as well as company or Bio Med Devices useful information. Mr. Robert is really wanted to secure all the useful and valuable data and information from the other system and also secure form the system hackers, who hack the system which is connected by the help of the internet communication services and remove all the useful information as well as important data.

For that reason Mr. Robert is using a conceptual map by the help of the information security and computer security (Gantz & Philpott, 2013). The conceptual mapping of the information security system is easily analyzing the risk assessments of the system or devices, which is connected to internet communication services or system.

Concept Map

According to the case study, the problem is solving by the help of the virtual security services or cyber security management system. By the help of the virtual security services or cyber security management system Mr. Robert is easily solve it virtual problem. By the help of the virtual security services or cyber security management system, the conceptual map of the Mr. Robert problem is shown in below.

 

By the help of the above conceptual map which is consist by the help of the virtual security services or cyber security management system (Dhillon, 2001). The above conceptual mapping is the outcomes of all the cyber problem as well as information security issues of Mr. Robert. The above discuss conceptual map is also perfume as destructive acts in the virtual system or cyber system. The above conceptual mapping is also performed as good condition as well as by the help of it Mr. Robert can easily achieve all the goals.

Analysis

According to the case study of Mr. Robert, the conceptual map is consisting and design according to the wanting. The conceptual map is very useful for the protecting the system form the other user as well as hackers of the system or devices. The devices which are connect with internet communication services or internet communication system, they controlling and monitoring by the help of the virtual security services or cyber security management system. The virtual security services or cyber security management system is working or follow the information security rules, which are also consist by the help of some various types of systems, technologies, services, networking and may others. The virtual security services or cyber security management system is easily monitoring the whole conceptual map by the help of its parameters throughout its network design (Axelrod, Bayuk & Schutzer, 2009). The virtual security services or cyber security management system is also monitoring the various type of risks for the user system or computer and as well as possible transmitted the useful data for back up files. After completing the backup they detected the problem area and solve as well as soon.

The main problem of the virtual security services or cyber security management system is managing that is cyber problem or hackers. The threats are coming in the user system or computer by the help of the internet communication. The virtual security services or cyber security management system is also monitoring as well as managing the devices or system and also protect useful information and useful data.

Outcomes and Recommendation

The virtual security services or cyber security management system is system or technology by which the user or customer of the system are easily protect the devices as well as computer system. The virtual security services or cyber security management system is also monitoring and controlling all the risk about the cyber system, which is very high. The virtual security services or cyber security management system is consist a multi level defense system or technology which is opposes the hackers as well as other information security risks due to the inter communication services. The above mentioned conceptual map is consist and solving by the help of various parameters like router, firewall, useful networks, internet communication and many others.

The analysis of the problem area by the virtual security services or cyber security management system is involves a rigorous register or list, which is already prepared by the information security services of the system or user computer (Axelrod, Bayuk & Schutzer, 2009). The virtual security services or cyber security management system is also knows all the information about the servers of the system or devices, networks, work station and also data. The system is protected by the help of the some various policies like changing password using password management, anti-virus services, firewall and information backup.

Conclusion

The virtual security services or cyber security management system is a type of technology by which system or user of the device is easily analysis and solving the virtual as well as cyber problem. The implementation of the virtual security services or cyber security management system or technology is the best way to protect the system or devices which are connected with internet communication services.

References

Axelrod, C., Bayuk, J., & Schutzer, D. (2009). Enterprise information security and privacy. Boston: Artech House.

Contos, B. (2006). Enemy at the water cooler. Rockland, Mass.: Syngress.

Coskun, H., Cigizoglu, H., & Maktav, M. (2008). Integration of information for environmental security. Dordrecht: Springer.

Dhillon, G. (2001). Information security management. Hershey, Pa.: Idea Group Pub.

Gantz, S., & Philpott, D. (2013). FISMA and the risk management framework. Boston: Syngress.

Peltier, T., Peltier, J., & Blackley, J. (2005). Information security fundamentals. Boca Raton, Fla.: Auerbach Publications.

Tipton, H., & Krause, M. (2005). Information security management handbook. [London]: Taylor & Francis e-Library.

Zelkowitz, M. (2004). Information security. Amsterdam: Elsevier Academic Press.