Academic Writing Experts For Your Research Projects

Order custom papers, masters thesis and dissertation in 3 guided steps; human written!

Posted: November 19th, 2022

Write a 1- to 2-page memo to the Chief Executive Officer

Scenario: You recently joined an organization that depends on the use of the web to perform most of its major functions. You notice that the staff performing the work tasks that keep the business running mostly ignore information security and it seems like security is not a priority with management or executive leadership.

Write a 1- to 2-page memo to the Chief Executive Officer (CEO) of the organization designed to increase awareness and priority of information security. Include a convincing argument of why the survival of the organization may depend on information security. Analyze the current situation, and illustrate examples of how ethics play a role. Be sure to include the following topics:
Confidentiality, integrity, and availability
Threats from malicious software
Security challenges of cloud computing
Cyberterrorism and information warfare
---

Who Can Write My Dissertation or Research Paper? Best Writing Service!

Looking for reliable dissertation help or thesis writing? Our expert team of MPhil and PhD-qualified professionals provides top-notch online assistance for dissertations, research papers, and essays—free from errors, plagiarism, and hidden fees. We select each specialist based on their academic expertise, ensuring high-quality thesis writing and research paper support. Beyond writing, we offer personalized guidance, one-on-one doubt-clearing sessions, and free study resources. Whether you need instant dissertation help or long-term research paper support, our experts are ready to help you succeed.

To:
From:
Subject Matter: Increasing awareness and information security
Date:
The current situation at the organization is that most work done through the network system is not well protected, the information security system of the organization does not have enough encryptions, and the computers being used are not password protected or protected from viruses that might affect their functioning or corrupt the information. The organization should ensure that the information security issue is a priority in its operations. Lack of information security awareness regarding the internet among workers in the organization creates a large vulnerability gap that can be exploited by attackers for monitory gain or hackers taking control of the system through a Trojan horse (Cobb, 2019).
The CEO of the company should consider the role of ethics in information security in order to achieve better and robust information security. Some ethical concerns of information security that should be established and demonstrated to the employees in the organization include ethical measures that can be applied to ensure that computer assets are protected to avoid leaks and unauthorized access to organization information. The employees should be encouraged to encrypt their computers with passwords, two-factor authentication, and biometric verification. The other ethical issue concerning information security that should be applied by computer users in the organization is the protection of private information of clients. All employees should ensure their computers are protected against any kind of attack or information leak that could comprise critical information about a client or the organization operations (Aşuroğlu & Gemci, 2016).
In order for the information security system to be stable enough, the organization should engage three building blocks of information security that include confidentiality, integrity, and availability. Confidentiality is an important aspect of information security since it involves keeping certain information as a secret. Confidentiality in the organization will ensure sensitive information such as bank account statements and trade secrets is only accessed by authorized personnel (Ghahrai, 2019). The organization should be able to maintain the integrity of information. Integrity means that the information being sent is received in an exact form that it was sent without being compromised during the transit. The other aspect of information security that the organization should consider is the availability of information. Availability means that the data would be available for access by the authorized parties whenever required (Ghahrai, 2019).
Information security faces another of threats from malicious software. Some of the most common malicious software attacks include virus which has the ability to affect the computer system through programs on the host computer such as videos and songs, or they can be travel through the internet to the host computer (Garg, n.d). Worms are another threat to information security. Worms self-replicate themselves through the network and can easily move from one computer to another if the computers are connecting to the same network. They mainly affect the computer functioning by slowing down the performance speed of the computer. The last threat is the Trojan horse which conceals themselves in the computer software. They are capable of stealing information or providing a backdoor gate for other malicious programs without user knowledge (Garg, n.d).
Cloud computing faces serval security challenges such as loss of data through malicious attacks, accidental deletion of data results to data results to permanent loss of data, and through catastrophic incidences like fire; the other challenge of cloud computing is advanced persistent threats which take place over a longer period of time directed to a specific target such as user data. Cloud computing also poses a high risk since it keeps all the data at the same place. This can be disadvantages to an organization if the cloud account gets hijacked (Devi, 2018). Cyberterrorism can be defined as the use of computer systems, programs, and data to course violence against noncombatant targets. Cyberterrorism can course significant economic damage, disrupt communication and supply lines, and degrade the national infrastructure. MyDoom virus can be considered as an example of cyberterrorism. Information warfare can be described as an attempt to manipulate information in pursuit of a political or military goal (Alexander & Swetnam, 2000). The most common example of information warfare is propaganda which can be posted on the internet by a group who want people to believe in their belief.
In conclusion, the CEO of the organization should be able to look at the current situation of the organization and consider the possible risks that might be facing the organization that has been listed. It will be, therefore, important for the CEO to increase awareness and priority of information security across all levels of the organization.

References
Alexander, Y., & Swetnam, M. (2000). Cyber Terrorism and Information Warfare: Threats and Responses. Transnational. Retrieved from https://www.researchgate.net/publication/267637417_Cyber_Terrorism_and_Information_Warfare_Threats_and_Responses
Aşuroğlu, T., & Gemci, C. (2016). Role of Ethics in Information Security. International Conference on Advanced Technology & Science (ICAT). Retrieved form https://www.researchgate.net/publication/307863852_Role_of_Ethics_in_Information_Security
Cobb, M. (2019). Increasing information security awareness in the enterprise. ComputerWeekly.co. Retrieved from https://www.computerweekly.com/tip/Increasing-information-security-awareness-in-the-enterprise
Devi, A. (2018). 7 Top Cloud Security Challenges and its Solutions (Infographics). Mercury Solutions Limited. Retrieved from https://www.mercurysolutions.co/blog/7-top-cloud-security-challenges-and-solutions
Garg, R. (n.d). Threats to Information Security. GeeksforGeeks. Retrieved from https://www.geeksforgeeks.org/threats-to-information-security/
Ghahrai, A. (2019). Confidentiality, Integrity and Availability. Testing Excellence. Retrieved from https://www.testingexcellence.com/confidentiality-integrity-availability/

Tags: top uk dissertation writing services, top rated dissertation writing services, someone to write my paper, service writing my essay write custom, research paper writing service cheap, quick essay writing service

Why choose Homework Ace Tutors

You Want Quality and That’s What We Deliver

Top Academic Writers

We’ve put together our writing team with care, choosing talented writers who shine in their fields. Each one goes through a tough selection process, where we look for folks with deep expertise in specific subjects and a solid history of academic writing. They bring their own mix of know-how and flair to the table, making sure our content hits the mark—packed with info, easy to read, and perfect for college students like you.

College Prices

We don’t do AI-written essays or copycat work—everything’s original. Competitive pricing is a big deal for us; we keep costs fair while delivering top-notch quality. Our writers are some of the best out there, and we charge rates that stack up well against other services. This means you get stellar content without draining your wallet. Our pricing is straightforward and honest, built to give you real value for your money. That’s why students turn to us for high-quality writing services that won’t break the bank.

100% Plagiarism-Free

Academic integrity is at the heart of what we do. Every paper starts from scratch, with original research and writing tailored just for you. We write 100% authentic—no plagiarism research essays. Our strict quality control process includes scanning every draft with top tools like SafeAssign and Turnitin, so you get a similarity score and proof of originality. We’re obsessive about proper citation and referencing too, crediting every source to keep things legit. It’s all about giving you peace of mind with content that meets the highest standards.

How it works

When you decide to place an order with Dissertation Writer, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went and the marking criteria grade you scored. You can leave a review recommending a writer for your class and course mates.