Create a 5 pages page paper that discusses the growing importance of information security.

Get perfect grades by consistently using Place your order and get a quality paper today. Take advantage of our current 20% discount by using the coupon code GET20

Order a Similar Paper Order a Different Paper

Create a 5 pages page paper that discusses the growing importance of information security. Known bugs, design flaws, unsecured communication paths and poor programming techniques can affect the software used by governmental organizations and this can in turn result either in the stealing or corruption of data. Therefore, a secure development program should be integrated with all phases of the Organization’s Software Development Life Cycle (SLDC). A series of Access-Related Controls (ALCs) are to be developed and maintained by the concerned authorities with a view to control access to information and data, and keep them secure, protected and confidential. Trustworthy personnel should be put in charge of the development, protection and implementation of governmental policies that frame measures to eradicate terrorism. The Governments need to apply improved software testing methods to guarantee a high level of reliability on initial software release so that the quality and integrity of the software can be ensured.

In this regard, the steps undertaken by NIST (National Institute of Standards and Technology) to strengthen information security in the Federation government are commendable. The information security work of NIST is carried out in the Information Technology Laboratory (ITL) and it “develops tests, metrics, and guidance for building trust and confidence in the IT systems that are now pervasive in the nation’s economy, its organizational, governmental, scientific and technological infrastructure.” (Wu 2004). Special researches are being conducted by NIST to “identify information security vulnerabilities” and to evaluate “security policies and practices developed for national security systems.”

On the other hand, information technology should be used as the best counter-terrorism strategy to sort out all sorts of possible information collected by the various governments’ intelligence and counter-terrorism agencies.

Do you need help with this or a different assignment? We offer CONFIDENTIAL, ORIGINAL (Turnitin/LopesWrite/SafeAssign checks), and PRIVATE services using latest (within 5 years) peer-reviewed articles. Kindly click on ORDER NOW to receive an A++ paper from our masters- and PhD writers.

Get a 15% discount on your order using the following coupon code SAVE15

Order a Similar Paper Order a Different Paper