The Language of Information Security
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 161 | Views: 339

Informative Article | Information Security | India | Volume 7 Issue 7, July 2018 | Popularity: 6.3 / 10


     

The Language of Information Security

Mahesh P G


Abstract: This paper examines the concept of information security, the threats it faces, its relevance and prospects in the 21st century. Information security is vital to every industry but much more importantly in the financial industry. This is because of the threat of hacking is greater in this industry than in every other industry. A lot has been done in the area of enhancing the security measures to guard against such threats however the best solution to these security challenges is to embark on effective training and manpower development of IT professionals in each organization with the support of Senior Leadership. Senior Executives are ultimately responsible for the security of information entrusted to their organization. A well supported information security program by the management will enhances the work safety to the employees, confidence and trust to customers, meets regulatory requirements and provides continuity of business.


Keywords: Information Security, Cyber Security, Compliance, Hackers, Risk, DDOS


Edition: Volume 7 Issue 7, July 2018


Pages: 905 - 907



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Mahesh P G, "The Language of Information Security", International Journal of Science and Research (IJSR), Volume 7 Issue 7, July 2018, pp. 905-907, https://www.ijsr.net/getabstract.php?paperid=ART2019132, DOI: https://www.doi.org/10.21275/ART2019132

Similar Articles

Downloads: 0

Analysis Study Research Paper, Information Security, United States of America, Volume 11 Issue 2, February 2022

Pages: 1376 - 1377

Beyond Baselines: Customizing Configuration Compliance for Industry-Specific Threat Models

Santosh Kumar Kande

Share this Article

Downloads: 0

Research Paper, Information Security, United States of America, Volume 13 Issue 3, March 2024

Pages: 1953 - 1955

The Role of Asset Inventory Accuracy in Vulnerability Remediation Effectiveness

Santosh Kumar Kande

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Security, Saudi Arabia, Volume 10 Issue 12, December 2021

Pages: 624 - 630

Secure Two Factor Authentication Framework based on Deep Learning

Talal Eid Alanzi, Dr. Mohammed Naif Alatawi

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Security, India, Volume 11 Issue 2, February 2022

Pages: 148 - 151

Formulating Operating System Anonymization by Monolithic Keyring Subsystem Fabrication

Ujas Dhami, Nisarg Shah

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Information Security, Malaysia, Volume 13 Issue 8, August 2024

Pages: 738 - 747

Assessing Cybersecurity Threats and Awareness in Bosaso's Banking and Telecom Sectors

Mohamed Abdirisak Buraale, Dr. Tiktik Khawa Abdurrahman, Dr. Fazilah Che Fauzi

Share this Article
Top