IT550 Assignment Unit 1 Kaplan University As the digital age progresses, more and more business is conducted electronically. Symbiotically illegal activities of those that wish to prosper from security vulnerabilities will increase. Cybercrime can be motivated by a number of factors including terrorism. Cyberterrorism is any terrorist act that uses computers as the vehicle for their attack. Cyber terrorists can be motivated to target organizations that will result in the radical’s group to cause the most harm and/or receive the most attention for their party.
Ping Sweeps and Port Scans: Danger or Not? Guillermo Reveo Turnbull DeVry University SEC 280 Principles Information Systems Security Professor: Gregory Gleghorn May 11, 2015 Ping Sweeps and Port Scans: Danger or Not? The Information Technology world is constantly evolving with the passing of each and every day. As developments arise that add to the advancement of the various enterprises, there is still a growing concern for ways to protect intellectual property from being invaded by intrusive attacks employed by individuals or groups seeking to compromise the network security of many companies using some of the most clandestine approaches. The only intent is to wreak havoc at any possible moment.
Unit 3 Assignment 1: Analyzing the Critical Security Control Points The following is a listing of security control points that any company should look at as necessary areas for precaution and care. Information covered by each area will be what each area consists of, how it strengthens the company security and what could happen if these areas are not properly maintained. 1. Inventory of Authorized and Unauthorized Devices and Software – a listing of processes and tools used to track/control/prevent/correct network access by devices and software. Attackers are always looking for devices and software that are newly added to a system and not updated correctly with the security measures in place already.
I would change the administrative passwords on all systems routinely, implement a firewall program with remote access control which will not allow, hackers entry to your company’s system. Without passwords being assigned to data and systems, this simply protection becomes a target for hackers. Identity theft occurs in some of the largest companies and often times this security breach is kept quiet. This company has been hacked for customer’s birthdates twice in one month. This means that they are experiencing severe vulnerabilities and they need to take action immediately.
In this journal, Drew discuss the goals of IT security to protect the use of mobile devices in CPA firms and other businesses. His article outlines cybersecurity threats on the mobile and cloud fronts and lists steps that accounting firms, individuals CPAs, and other can take to reduce their risk of suffering a devastating data breach. Drew discusses how the rate of smartphones and tablets sales increase and how it reached 144.4 million units in the first quarter. With the growth of smartphones and tablet increasing, the risk of malicious software have increased. “One of the biggest risks involves employees or executives downloading personally identifying or confidential client information to their personal smartphones or tablets”.
Common Information Security Threats Paper CMGT/400 University of Phoenix January 27, 2013 In this day and age, technology has grown so fast that most of us are playing catch up to the people who were born in the “computer era”. As technology continues to advance, so do the threats; especially to businesses. Instead of having an upfront attack or robbery, they have chosen to go the electronic way. The one business that I would like to cover would be the banking industry. This institution is constantly being attacked, on a daily basis, with various methods.
Understanding these threats allows the organisation to prevent, protect and correct any damage done to his/her computer to an extent. This can help to reduce the negative impacts it may have on an organisation. Threats: Below is a list of threats to IT systems, ways to keep the system and data secure and organisational issues affecting the security of IT systems. 1. Malicious damage: Examples can be Viruses, Worms or Trojans a.
Hackers may want to strike critical points of our infrastructure such as our economy or government. “The threat of cyber attack has grown so severe that the need for cyber security has topped the Director of National Intelligence list of global threats for the second year”. All across the FBI agency, cyber security is becoming a top priority. Any breach of any part of the FBI can be severe damage. It is better to prevent and predict attacks than to have to respond to them.
Because transactions take place over the internet companies have to ensure that the customer’s personal information is safe along with the company’s information. Companies use different types of security programs to keep information safe from computer attacks. Computer attacks on a company can happen when the security program is not effective enough to keep these attacks from happening or from the lack of monitoring of the security program from management. The task of monitoring the security program is given to management, so companies should be held liable for losses sustained in a successful attack made on its AIS by outside sources. In the following an explanation of management’s role and why a company should be held liable.
I would implement firewalls, cryptography, antispyware, antivirus, and content filtering. These will be installed in various levels of our network infrastructure including, our mail servers, gateways, laptops and desktops. When these security technologies are in place a threat may be able to bypass on level of security but will be detected and eradicated at another. Layering our security in this manner will mitigate the risks of an employee disabling their protection on the workstations. Our mail servers which send, receive and store emails must be secured as well.