Threats in Information Security

1410 Words6 Pages
Some Common Threats in Information Security David Epperson CMGT/400 November 26, 2013 Michael, Taousakis Some Common Threats in Information Security As an enterprise’s dependence on computers and the internet increase, there are further and newer threats that they may face from hackers and rebels alike. For every solution that companies come up with to secure themselves against cyber-attacks, those who wish to do harm find many new means of attack, it is a continuous struggle. In a 2012 Cost of Cyber Crime Study," which was supported by security intelligence tool vendor HP, the regularity of online attacks against U.S. businesses continues to increase, along with the cost of defending against those attacks and mitigating any resulting data breaches. Cybercrime now costs a U.S. business $8.9 million per year, an increase of 6% from 2011 and 38% from 2010 (Schwartz, 2012). The purpose of this paper is to discuss three of the major information security threats that business and organization face every day: For instance breaches, cyber espionage, and mobile malware. A breach is when there is unauthorized access to someone’s personal information for means to collect, use, or to disclose. A breach happens when information is stolen, lost, or disclosed by accident (e.g., a computer containing personal information is stolen or the information is emailed to the wrong recipient). Breaches may also be a result of errors in an organization’s procedures. Such information that is stolen can belong to a customer, patient, client, or employee. Once a breach has been identified, the organization must take immediate action to address the incident and reduce any additional risk that may result from the event. This is when redundancy becomes important in enterprise architecture because organizational information systems provide a failover mode that helps to ensure that failed
Open Document