Hire writer
Paper Types
Disciplines

Application Security, Research Paper Example

Pages: 1

Words: 323

Research Paper

SECURITY CONTROLS

For a number of years controls have been used in IT for security purposes. In the past, the focus of the controls was only on the internal systems. But, in early 2000s there were numerous frauds incurred by large corporations such as Enron and WorldCom (Umar, 2003). As a result the use of external controls has increased. Application controls can protect the application from unauthenticated and unauthorized users alone. Whereas the auditing, which is an external control must be implemented to protect the application from the external attacks. Thus the application security should emphasize on the combination of application controls and the external controls to protect the assets of the organization.

RESOURCE CUSTODIAN

An Information Resource Custodian is a person or a department responsible for managing the access to the information resource and resource controls. Resource custodians are generally referred to as system administrators or IT service providers. By default, the users are the custodians of their devices and are responsible for ensuring that the device comply with the policy requirements. For example, The University is the resource custodian of the data concerning its staff, students and faculty, as well as the university itself (Umar, 2003).  Only authorized users may access and use the confidential information.

I2SF-GASSP APPROACH

In mid-1992 Formation of the International Information Security Foundation (I2SF) – Sponsored Generally Accepted System Security Principles Committee (GASSPC) began (Poore, n.d.). GASSP approach provides legal and authoritative reference for information security practices, principles and opinions. Good practices will increase the efficiency and effectiveness of the business, promote trade and improve productivity of the application. In future, due to the technological advances, the password technology will be replaced by the smart card technology there by increasing the application security (Poore, n.d.).

REFERENCES

  • Amjad Umar (2003). Information Security and Auditing in Digital Age: A Practical and Managerial Perspective. NGE Solutions, Inc.
  • Ralph Spencer Poore (n.d.). Generally Accepted System Security Principles (GASSP). In Information Security Today. Retrieved February 25, 2013, from http://www.infosectoday.com/Articles/gassp.pdf

 

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

Global Air Pollution and Global Climate Change, Research Paper Example

We know that the Earth’s climate has changed many times throughout its existence. There have been both ice ages and long periods of warmth. Many [...]

Pages: 1

Words: 1379

Research Paper

Western Europe History in the 14th Century, Research Paper Example

Summarize the ways in which Jesus’ ministry reflected the values in 1st century Judaism. Then discuss the ways in which Jesus’ teaching marked a radical [...]

Pages: 1

Words: 2198

Research Paper

Otherness, Research Paper Example

Otherness has been defined based on the context of how an author wants to use the word in his poem, conversations, context, stories, etc. Dr. [...]

Pages: 1

Words: 647

Research Paper

Dying on the Inside: The Death Penalty, Research Paper Example

Introduction The death penalty, also known as capital punishment is reserved for crimes which are exceptionally cruel in nature. The purpose is to send a [...]

Pages: 1

Words: 2351

Research Paper

Plato’s Allegory, Research Paper Example

Plato´s Allegory of the Cave and Our Everyday Reality Since as long as man has had reason, he has attempted to use it to understand [...]

Pages: 1

Words: 990

Research Paper

Communicating Effectively, Research Paper Example

Introduction. The Importance of Communication It is impossible to imagine one’s life without communication – there is nobody who would not agree to this simple [...]

Pages: 1

Words: 2531

Research Paper

Global Air Pollution and Global Climate Change, Research Paper Example

We know that the Earth’s climate has changed many times throughout its existence. There have been both ice ages and long periods of warmth. Many [...]

Pages: 1

Words: 1379

Research Paper

Western Europe History in the 14th Century, Research Paper Example

Summarize the ways in which Jesus’ ministry reflected the values in 1st century Judaism. Then discuss the ways in which Jesus’ teaching marked a radical [...]

Pages: 1

Words: 2198

Research Paper

Otherness, Research Paper Example

Otherness has been defined based on the context of how an author wants to use the word in his poem, conversations, context, stories, etc. Dr. [...]

Pages: 1

Words: 647

Research Paper

Dying on the Inside: The Death Penalty, Research Paper Example

Introduction The death penalty, also known as capital punishment is reserved for crimes which are exceptionally cruel in nature. The purpose is to send a [...]

Pages: 1

Words: 2351

Research Paper

Plato’s Allegory, Research Paper Example

Plato´s Allegory of the Cave and Our Everyday Reality Since as long as man has had reason, he has attempted to use it to understand [...]

Pages: 1

Words: 990

Research Paper

Communicating Effectively, Research Paper Example

Introduction. The Importance of Communication It is impossible to imagine one’s life without communication – there is nobody who would not agree to this simple [...]

Pages: 1

Words: 2531

Research Paper