Directory Image
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.

IT Security Terminologies Delineated

Author: Lucy Sarah
by Lucy Sarah
Posted: May 22, 2014

It may look apt to know about a few terminologies before exploring the horizon of Information Security Dubai as without grasping some basics it might be exact implication of jumping the gun. To being with it is data breech a term that entails every conversation that is about securing a certain parameter from slashes of hackers and so on. This title is given to all such situation in which fiscal, monetary, and medical data is put under risk along with the name of holder. This information may either in tangible for intangible form, the former represents actual of paper-based data while the latter is about electronic shrouds of information. Well, about the ways and means how a certain bit is denuded of its security, three have been shortlisted and top of the range is attack by some criminal, hacker or likewise. The second cause is either problem in computer or the same cause at the hands of some employee or user. The price of each such incident relies on what made somebody to seek it and what was the level of protection at the time when it was compromised.

Record is solely associated with a living soul. To understand things clearly with an example, we assume that a company X deals in retails business and maintains database in parallel grove of information of financial instruments such as debit or credit card and so on. Beyond the money matters it can involve medical record such entailing health insurance, who is the physician one has been receiving treatment or under whom surgeon’s knife one has been. The payment details many fancy someone as well. It was estimate by Ponemon that in an all in all cost of each event of theft or loss was not less than one hundred and forty five dollars. In connection with preparing a report, the putative organization chose a tiresome and details approach of conducting interviews and this particular incident involved one thousand, six hundred and ninety interviews. All the respondents of these numerous interviews were experts who are at home either in Information Technology, IT security or compliance spheres, as they had access to first hand information about if some data was stolen or lost. Furthermore, they could provide valuable information about price tag each such incident was carrying. This obscene ascertaining could not have not been completed in an instance, that is why, it does not surprise when we are told that it had needed less than a year.

About the Author

Si delivery model is based on industry best practices and technologies that are aligned to our clients’ IT infrastructure and business processes.

Rate this Article
Leave a Comment
Author Thumbnail
I Agree:
Comment 
Pictures
Author: Lucy Sarah

Lucy Sarah

Member since: May 14, 2014
Published articles: 9

Related Articles