This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Information security

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Information security

Information security is critical in the current world since the information contained in the databases should be maintained confidential to serve the intended use. Regarding this, the stakeholders should be conversant with the most effective techniques that can be used to counter the adverse effects that might arise. Consequently, information confidentiality and integrity can be achieved. Information technology values the privacy and the integrity of the information since the two are the critical ingredient to the success of the information technology firms.

 

Recently, I fell victim to phishing, whereby a stranger convinced me to give my mobile number and email. According to the person, the email was to ascertain that the person had collected information from me, which I had no problem with. After a few months the I received a message from n unknown sender claiming that they needed further reviews on the products that the person had asked me some months ago. With my naivety, I followed the link to give my feedback on the things that they wanted opinions for. This was my downfall since, after opening the link, it posed some severe threats to the sensitive information in my email. This made me make some alterations to my sensitive accounts to prevent further damage.

The data management technique is a field that should be given the magnitude they deserve. This implies that the information technology key players should divert more effort into it. This will ensure that the people are equipped with the necessary information to act as their defense in times of need. In my case, I did not consider giving out my email as a security threat until I was hacked. From this inference, people should be keen on how they give their sensitive information since the information can be used to destroy them.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask