Security Report

598 words - 3 pages

Case Study
Jose Rios
Professor Johnson
May 12, 2013

Case Study 1
Cyber attacks are starting to become more popular as companies solely depend on technology to get through their workdays as well to store most of their customers and employees confidential information. Most companies invest money on securing their databases to prevent any type of cyber attack and even though they try to prevent these types of events from occurring hackers are becoming more creative on the way they hack onto companies’ secured network. Hackers go through tremendous amounts of time in order to get to a secured network in order to get the information they are seeking or just to go through private information for their own personal gain. Secured networks are set up throughout organizations to minimize the possibility of a cyber attack from occurring along with other security measures to protect the private information ...view middle of the document...

”(Denning, Dorothy E.) Other cyber attacks are meant to steal valuable information from high-end organizations in order to jeopardize future projects as well as past projects that some how have affected others. No matter how good and secured a network is there always a chance that it can get hacked by experienced hackers and that’s what IT security should always keep up with technology along with the new methods that hackers are using to get in to secured networks.
There are several different methods from preventing cyber attacks from occurring and every day these procedures are being change in order to keep up with the high amounts innovated ways that hackers are coming up to reach their ultimate goal. All employees should follow the rules and regulations that have been established to keep their network secure even if it means not opening any sort of spam email, going through their social network page, sharing password’s or going to any websites that might seem malicious. Employees should encrypt every email they send especially if that email contains private or important information that certain people shouldn’t get their hands on. Every procedure that is put in place is to protect the best interest of an organization secured network as silly as the procedure might be once an employee slips up that’s when hackers take advantage and infiltrate that network to do the most damage as possible.
Finally no matter how well secured a network might seem there is always room for error and when a secured network is vulnerable at it’s most that’s why employees should always be on the lookout for suspicious emails, websites and Bluetooth devices. IT departments should try their hardest to keep up with the everyday growth of technology to keep cyber hackers from hacking into an organization’s network. Even though most secured networks always run the risk of being hacked by experience cyber experts that oppose some sort of danger to an organization.

Denning, Dorothy E. “Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy.” Info War Online. 4 February 2000. Accessed 1 March 2010 from

Other Papers Like Security Report

Is3230 Essay

1016 words - 5 pages  Discussion on project concerns and progress up to this checkpoint  A review of the course project’s outline and schedule for completion | Draft the report and thePowerPoint presentation to discuss with your instructor, the CIO. | Deliverables Introduction User identification, authentication, and authorization are essential in developing, implementing, and maintaining a framework for information system security. The basic function of an

Global Distribution, Inc (Cdi) Security Policy

1408 words - 6 pages information security requirements. • Investigate and report to management on breaches of security controls and help maintain security safeguards. Management and employees should be granted access to physical areas and systems that are necessary for the completion of their job responsibilities. The top level of the organization should issue a clear policy statement on disaster recovery planning. The plan should be define as a process of planning

Homeland Security Research Design

2565 words - 11 pages to argue against terrorism as a threat to homeland security. References Bjelopera, J., P. (2013).American Jihadist Terrorism: Combating a Complex Threat. (CRS Report No. R41416). Washington, DC: Congressional Research Service. Brown, B. (2007). Community policing in post-September 11 America: A comment on theconcept of community-oriented counterterrorism. Police Practice and Research,8, 239-251. Forest, J. (2006). Homeland security

Tft2 Cyberlaw, Regulations, And Compliance

1310 words - 6 pages Running Head: Policy Statements 1 Policy Statements Kevin Corey Western Governors University Policy Statements 2 Internationally security techniques and standards, such as ISO 17799, establish guidelines that organizations must implement in order to maintain information security. Information must be protected from those without a readily need to know to perform organizational business functions. Unauthorized access to

Create An Email Script To Be Sen To At&T Customers Informing Them Of The Security Breach And A Plan To Resolve The Issue. Explain Your Rationale

359 words - 2 pages Create an email script to be sent to AT&T customers informing them of the security breach and a plan to resolve the issue. Explain your rationale. To the Loyal Employees and Contractors of AT&T, We are contacting you because we have learned of a serious data security incident that occurred on between July 29, 2011 and August 1, 2011 that involved some of your personal information. The data security breach occurred as a result of the

System Security Plan

1354 words - 6 pages . This document addresses the first version of system security plan (SSP) of automated banking system. The purpose of this report is to describe the controls that are in place or are in the plan, the expected behavior and the responsibilities of the individuals who uses or access the system. The document structures the planning process of implementing the security control procedures to provide adequate security and cost

Principles Of Information Security: Chapter 1 End-Of-Chapter Questions

790 words - 4 pages Chapter 1 Assignmnet Ryan M. Kethcart INFOST-491 SEC-OL Exercises 1. Look up “the paper that started the study of computer security.” Prepare a summary of the key points. What in this paper specifically addresses security in areas previously unexamined? a. A paper titled the “Rand Report R-609” was sponsored by the Department of Defense and initiated the movement toward security that went beyond protecting physical locations

It255 Project

1460 words - 6 pages  Montreal, Canada  New York City, New York  Washington, D.C. Tasks You are a networking intern at Richman Investments. This morning, you received an e-mail from your supervisor stating that you need to create an outline of the general security solutions planned for the safety of data and information that belongs to the organization. You are told that every month, the networking division needs to submit a report to the senior management

Security Threats

2408 words - 10 pages these threats and ways to prevent them later in the report. In 2010 Kevin Prince, CTO, Perimeter E-Security "As these security threats are becoming more serious and difficult to detect, it is vital for companies to understand what they can do to best protect their systems and information” he also was implying that Information Security Office stay update with changes in Information Technology community. (Prince 2010) Vulnerabilities in computer

Case Study Data Breaches And Regulatory Requirements

1570 words - 7 pages over, it would help strengthen agency wide policies and procedures, it would help agencies to report to appropriate entities. A clear guidance on risk levels, how agencies should assess if individuals should be notified, timing of reporting need to respond quickly and appropriately, fix weaknesses in security controls this would help improve information security. I feel this should be pushed by all states and with the ever rising of data breaches

Social Security And Medicare

2550 words - 11 pages necessary improvements to Social Security and Medicare, need to work together to ensure a brighter outlook for future generations. Resources: Facts from EBRI-the basics of Medicare: updated with the 2008 Board of Trustees Report. (2008). EBRI Notes, 29(5), 13-18. Goss, S. C. (2010). THE FUTURE FINANCIAL STATUS OF THE SOCIAL SECURITY PROGRAM. Social Security Bulletin, 70(3), 111-125. Quadagno, Jill, (2008). Aging and the Life Course New

Related Essays

Security Incident Report Lab

298 words - 2 pages Security Incident Report Incident Report #: IR-783 Reported Date and Time: January 12, 2014 Technician: Max Smith Site Location: Sales Department laptop belonging to Howard Telmik. Windows 7 OS. Identification (Type and how detected): Howard in sales called the IT help desk complaining that his system is really slow. He also stated his laptop is behaving weird. Some of his internal reports have been modified and emails from last week

Principles Of Information Security 4th Ed Chapter 1 Review Questions

801 words - 4 pages secure. The common things associated are software, procedures, and people. 9. What system is the father of almost all modern multi-user systems? The mainframe computer. 10. Which paper is the foundation of all subsequent studies of computer security? Rand Report R-609 11. Why is the top-down approach to information security superior to the bottom-up approach? Bottom up lacks a number of critical features such as participant

Term Paper

282 words - 2 pages Performance, Problems & Prospect of Islamic Banking in Bangladesh. Internship Report on                     “Overall Branch Banking and A Comprehensive Review on                                     Investment of First Security Islami Bank Ltd”                               [pic]  “Overall Branch Banking and A Comprehensive Review on                   Investment of First Security Islami Bank Ltd” Submitted to Dr

Introduction To Network Security Essay

428 words - 2 pages security 5. Confidentiality: Information should only be accessible to its intended recipients. Integrity: Information should arrive the same as it was sent. Availability: Information should be available to those authorized to use it. 6. The CIA triangle is still used because it addresses the major concerns with the vulnerability of information systems 7. Availability: Authorized users can access the information Accuracy: free from