Information Protection and Security
Information Protection and Security
Information Protection and Security
Institution of Affiliation
Name
INFORMATION PROTECTION AND SECURITY 2
Abstract
There a high need and importance for organisations to protect and secure customer
information. This has led to the requirement for compliance with information security standards.
Many people confuse information standards with the act of having usernames and passwords.
Although this is true, it also entails many other important parts of intangible assets of an
organisation, customer trust and upholding customer level of confidence for the success of an
organisation. In spite of all this efforts to increase client information protection and security there
Introduction
Organisations cannot run without transfer of information between two are more parties.
This is usually done through the internet, intranet and extranet. The three channels are a high
target for hackers hence the need to provide protection security. Resent research shows that
information breach and credit card phishing is one of the most common security issues. A survey
on information protection and security done by Potter and Beards 2010 indicated that:
“Protecting customer information remains the most important driver for security, 28%.
Preventing downtime and outages (19%) has increased in relative importance, perhaps in
Due to the importance of information security and protection issues there are some
standards which have been developed for IT Governance to provide security. These includes:
PRINCE2, OPM3, CMMI, P-CMM, PMMM, ISO27001, BS7799, PCIDSS, COSO, SOA, ITIL
and COBIT.
INFORMATION PROTECTION AND SECURITY 3
In spite of the presence of these standards, there are challenges and issues that prevent the
Cost. The cost of engaging in customer information protection and security strategy is
high, thus leading to increase in overhead cost of an organisation that engages in the
implementation of the system. example is of organisation shunning away from private cloud
computing implementations dues to high cost associated with its adoption. Therefore, this leads
to the organisation adoption of old form of information security leaving most of their client
information to be vulnerable from attacks. Also, the cost of acquiring expertise to work on the
There are also the challenges of choosing from the many protection and security
standards platforms. This is due to the fact that they are so many with different unique nature and
characteristics which differs from one standard framework to another. Each standard has a
unique role and role in the implementation of 1SMS. Susanto, Almunawar and Tuan, (2011).
“There are several standards for IT Governance which leads to information security such
“Compliance with ISO 27001 will require employees to embrace new security controls
introduced by the standard. This organizational change could also affect company
culture”
There is also the necessity in providing an assessment tool for measuring organisation
“Novelty framework to descript and viewing ISMS is required, while introducing new
Implementing information protection and security mechanism can be seen as an overload for an
“The project can be seen as just additional workload and its benefits may be overlooked”
Telephone conversation is a major response media that provides customers with instant
feed back and a solution to their queries. This has been adopted by most organisations, to
mention some of the few is AT$T which signs up millions of credit cards. their report of 1990
“When AT&T entered the credit card business in March 1990, it had a powerful source of
Mailing is another response tool where customer and organisations uses unique address in
communication on any important matters. Mailing usually uses unique email addresses to
communicate between parties. It is a form of organisation data base where information about a
“When addresses do not exist, some manufacturers create them. Quaker set out in
September 1990 to find the addresses of 18 million of its customers by mailing cents-off
Use of catalogue. This is where the seller send a bid to sell inform of catalogue
and the buyer responds by buying or not buying. Many business organisation uses this
Most of the end users which are in most cases respond to the announcements in a positive
manner, this is by continuous conversation with the clients to get solutions to some of their
queries and at the end indulging into a business undertaking with the organisation through the
use of telephone conversations and mailings. Also, some customers respond by either purchasing
References
27001 Essential Information Security Controls. Computer Sciences, King Saud University.
http://www.articlesbase.com.
Chris Potter & Andrew Beard.(2010). Information Security Breaches Survey 2010. Price Water
http://blog.iso27001standard.com
Blattberg, R. C., and Deighton J.(1991). "Interactive marketing: exploiting the age of
OneFile, https://link.galegroup.com/apps/doc/A11649593/AONE?u=googlescholar&sid=AONE
&xid=6dccd9de.
Webster,. F.E. (1981), "Top Management's Concerns about Marketing: Issues for the
"Sears Rewards Shoppers in Bid to Boost Sales," Chicago Tribune, 12 September 1990,
sec. 3, p. 1.
Marketing 1
AT&T Signs Up a Million Accounts for Credit Card: Wall Street Journal, 13 June 1990,
p. B6.