Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Information Overload: Modern Design of Information Security Framework, Speech Example
Hire a Writer for Custom Speech
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Introduction
- Today, information technology and the Internet have remarkably increased the amount of information the users and employees access and process daily in their corporate environment (Juvvadi, 2003). Information is easier to obtain because of the different ways it can be acquired. But, since it is kept in separate, sometimes disconnected and unorganized facilities, it results in a huge volume of data which causes in “information overload” in the corporate systems.
- Xiao, Jones and Lymer presented a study in which they indicated that as internet has rapidly evolved and entered into every field of life, it has great significance to financial reporting also (2005). In future, the use of internet can affect the financial reporting systems in many ways that are needed to be explored.
- Email is a main reason for information overload in corporate environments. However, it is not the single factor. The modern corporate has large websites with information and pages increasing each month. Most of the information is kept in an unorganized, disconnected manner; corporate businesses often make their important business decisions by using this incomplete and out-dated data.
Thesis Statement
Owing to the vast amount of information stored in today’s modern systems we are in danger of creating an information overload; the concept of paralysis by analysis. As such it is arguable that we need to take steps to retain only meaningful and useful information
Framework for Visualization Systems
- A modern Framework – A Modern Design of Information Security Framework. It shows how the security data passes through a number of different stages like preprocessing, pre-filtering, post-filtering, encoding, and then finally appears on the visualization screen. On viewing the visual display, the users can log the results and obtain customized reports.
- A comprehensive Information Security framework. Identified components include the following:
- Inputs – The inputs might be of different types from an extensive array of data quality, ranging from unprocessed data to super-refined semantic data.
- Pre-filtering – With pre-filtering process, the users will be able to select the specific or required sub-category of records or fields for the next processing resulting in the less use of system resources.
- System Storage – This type of storage is not mandatory and can be bypassed in cases in which interactivity is minimal and process is not needed
- Post filtering and encoding – Filtering and encoding are twisted together and makes a loop. Prior to the process in the graphics engine and subsequent visualization, users are able to make selection about the information they want to see and the way of representation
- Graphics and Visualisation – The visualizations present the information in various ways as they use numerous information visualization methods.
- Visual Logging – Visual logging and reporting are of great significance, especially the reporting section; this allows sharing results with other experts, users, and administrators
- IDS Rainstorm – IDS RainStorm shows general representation of alarm information, enabling system administrator to analyze the network status and easily find anomalies
- Glossing – Glossing actuates when a cursor is pointed over any graphic or any textual area showing more details. In a zoom display, when pointed on any alarm glyph, gloss opens up containing details like the type of alarm, time, origin, and related IP address.
- Filtering – Filtering option is available in both view schemes i.e. overview and zoom views.
A comprehensive security framework boils down to three familiar basic components: people, technology, and process. (Patil,J.2008)
Conclusions
- Images play a vital role in modern frameworks in order to depict the activities that have been accomplished on the system during the day.
- Visual information of the security on a system is required in order that a holistic representation of the entire system activity may be fully realised.
- System Administrators have in recent years had to take on a more global perspective . This means taking a more holistic view of security and risk management with the view that a common set of procedures and standards are implemented, monitored and enforced across the entire international corporate network. Such a task is a major undertaking and many of the larger Banks have found it cheaper (by economies of scale) to subcontract this work to that of specialist security firms.
- The images provide a frame of reference for an administrator to view how the activity of the entire day has been. If any day the system administrator finds some variation, he can look into it more to check whether the deviation is anomalous. For a system administrator, comparison of the two images is a much easier task as compared to comparison of text logs.
- Today, for the corporate environments, information visualization of their security-related data is highly essential to ensure more security of their computers, servers, and networking. It is a both artistic and scientific work that requires professional capabilities related to graphics, information visualization, user interface development, and security communities to display the raw information into clear, useful and significant information and contents
- Generally, the flood of information is managed by roughly created statistical methods, textual views, and old graphical methods and sometimes by by-passing big amount of information
References
International Organisation of Supreme Audit Institutions. (1995). Information System Security Review. New York: International Organisation of Supreme Audit Institutions.
Patil, J. (2008). Information Security Framework: Case Study of a Manufacturing Organization. Mercy College.
Stuck with your Speech?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee