The Language of Information Security
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 161 | Views: 355

Informative Article | Information Security | India | Volume 7 Issue 7, July 2018 | Popularity: 6.3 / 10


     

The Language of Information Security

Mahesh P G


Abstract: This paper examines the concept of information security, the threats it faces, its relevance and prospects in the 21st century. Information security is vital to every industry but much more importantly in the financial industry. This is because of the threat of hacking is greater in this industry than in every other industry. A lot has been done in the area of enhancing the security measures to guard against such threats however the best solution to these security challenges is to embark on effective training and manpower development of IT professionals in each organization with the support of Senior Leadership. Senior Executives are ultimately responsible for the security of information entrusted to their organization. A well supported information security program by the management will enhances the work safety to the employees, confidence and trust to customers, meets regulatory requirements and provides continuity of business.


Keywords: Information Security, Cyber Security, Compliance, Hackers, Risk, DDOS


Edition: Volume 7 Issue 7, July 2018


Pages: 905 - 907



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Mahesh P G, "The Language of Information Security", International Journal of Science and Research (IJSR), Volume 7 Issue 7, July 2018, pp. 905-907, https://www.ijsr.net/getabstract.php?paperid=ART2019132, DOI: https://www.doi.org/10.21275/ART2019132

Similar Articles

Downloads: 0

Analysis Study Research Paper, Information Security, United States of America, Volume 11 Issue 2, February 2022

Pages: 1376 - 1377

Beyond Baselines: Customizing Configuration Compliance for Industry-Specific Threat Models

Santosh Kumar Kande

Share this Article

Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Information Security, United States of America, Volume 11 Issue 11, November 2022

Pages: 1496 - 1501

Human Resource Management with IAM

Sampath Talluri

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Information Security, United States of America, Volume 13 Issue 6, June 2024

Pages: 890 - 895

Preserving Patient Confidentiality: The Vital Role of Data Tokenization in Ensuring Data Security and Regulatory Compliance in Healthcare

Sivachandran Selvaraj

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Information Security, India, Volume 7 Issue 11, November 2018

Pages: 1978 - 1982

Strategic Construction and Implementation of Removable Media Policies for Mitigating Data Loss and Insider Threat Risks

Shanmugavelan Ramakrishnan

Share this Article

Downloads: 4

Dissertation Chapters, Information Security, India, Volume 10 Issue 10, October 2021

Pages: 1421 - 1426

From Digital India to Digital Economy: Understanding India's Cyber Infrastructure and Cyber Security

Roshan Rai

Share this Article
Top