Create a 5 pages page paper that discusses the growing importance of information security.

We are confident that we have the best essaywriters in the market. We have a team of experienced writers who are familiar with all types of essays, and we are always willing to help you with any questions or problems you might face. Plus, our writers are always available online so you can always get the help you need no matter where you are in the world.

Order a Similar Paper Order a Different Paper

Create a 5 pages page paper that discusses the growing importance of information security. Known bugs, design flaws, unsecured communication paths and poor programming techniques can affect the software used by governmental organizations and this can in turn result either in the stealing or corruption of data. Therefore, a secure development program should be integrated with all phases of the Organization’s Software Development Life Cycle (SLDC). A series of Access-Related Controls (ALCs) are to be developed and maintained by the concerned authorities with a view to control access to information and data, and keep them secure, protected and confidential. Trustworthy personnel should be put in charge of the development, protection and implementation of governmental policies that frame measures to eradicate terrorism. The Governments need to apply improved software testing methods to guarantee a high level of reliability on initial software release so that the quality and integrity of the software can be ensured.

In this regard, the steps undertaken by NIST (National Institute of Standards and Technology) to strengthen information security in the Federation government are commendable. The information security work of NIST is carried out in the Information Technology Laboratory (ITL) and it “develops tests, metrics, and guidance for building trust and confidence in the IT systems that are now pervasive in the nation’s economy, its organizational, governmental, scientific and technological infrastructure.” (Wu 2004). Special researches are being conducted by NIST to “identify information security vulnerabilities” and to evaluate “security policies and practices developed for national security systems.”

On the other hand, information technology should be used as the best counter-terrorism strategy to sort out all sorts of possible information collected by the various governments’ intelligence and counter-terrorism agencies.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Do you have a lot of essay writing to do? Do you feel like you’re struggling to find the right way to go about it? If so, then you might want to consider getting help from a professional essay writer. Click one of the buttons below.

Order a Similar Paper Order a Different Paper