COSTECH Integrated Repository

Determining Appropriate Security Protection for Enterprise Information Resources

Show simple item record

dc.creator Casmir, Respickius
dc.date 2018-10-01T21:27:42Z
dc.date 2018-10-01T21:27:42Z
dc.date 2015
dc.date.accessioned 2022-10-20T08:35:11Z
dc.date.available 2022-10-20T08:35:11Z
dc.identifier Respickius Casmir(2015), Paper Title: Determining Appropriate Security Protection For Enterprise Information Resources. Business Education Journal, Volume 1, Issue 1, 18 Page
dc.identifier http://dspace.cbe.ac.tz:8080/xmlui/handle/123456789/58
dc.identifier.uri http://hdl.handle.net/123456789/79432
dc.description Information and Communication Technology (ICT) is increasingly becoming an integral part of our work, social, political, business, and private lives. Terminology such as mobile banking, mobile money, e-learning, e-procurement, e-commerce, e-ticketing, social media, Internet, blogs, intranet, extranet, e-books, telemedicine, web portal, management information systems, decision support systems, and the like are quite common in our daily lives. The fundamental element behind all these is ICT. The benefits of ICT are enormous and, indeed, ICT is continually affecting our day-to-day lives in a positive manner. Enhanced efficiency, effectiveness, transparency and operational costs reduction are some of the benefits of ICT. Despite the innumerable benefits of using ICT based tools and systems to support our business operations, there are numerous, yet ubiquitous security risks, threats and vulnerabilities associated with the adoption and deployment of ICT. As a result, private users, enterprises, business entities, educational institutions, government and non-governmental institutions are always in dilemma upon deciding which security mechanisms to go for, why and how to do it. This paper provides insight on how to overcome this challenge by presenting fundamental principles on how to properly determine your information security requirements and decide on suitable and cost effective security mechanisms in a given context.
dc.format application/pdf
dc.language en
dc.publisher Business Education Journal
dc.relation Volume 1,;Issue 1,
dc.subject Information Resources, Security Risks, Threats, Vulnerabilities and Mechanisms
dc.subject Security Risks
dc.subject Threats
dc.subject Vulnerabilities and Mechanisms
dc.subject Information Resources
dc.title Determining Appropriate Security Protection for Enterprise Information Resources
dc.type Article


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search COSTECH


Advanced Search

Browse

My Account