Preview

Information Systems Security and Control

Powerful Essays
Open Document
Open Document
2534 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Systems Security and Control
CS 4550
Information Systems Security and Control

When a computer connects to a network and engages in communication with other computers, it is essentially taking a risk. Internet security involves the protection of a computer's Internet account and files from intrusion of an unknown user. Internet security has become an alarming issue for anyone connected to the net. This research paper argues the need for security over corporate intranets that have been dealing with the lack of security within the internet and the numerous attacks and malware threats that hackers use to breach security measures. A corporation uses a private computer network that uses Internet Protocol technologies to securely share any part of an organization's information or network operating system within that organization. This is known as the intranet which refers to a network within an organization and is used in contrast to the term internet which is a network between organizations. The intranet, a network belonging to an organization or a corporation, is accessible only by the members and employees with the proper authorization. The main purpose of an intranet is to compute resources among employees such as network usage data or to share company information such as company policies, job postings, company events, product literature, and so on. This paper also discusses the countermeasures that a corporation can take in order to reduce the impact of a potential attack against its information network established for its specific group of users that communicate and share data amongst each other.
Although an intranet is a closed private network within a corporation or an organization that does not mean that it is immune to malware lurking around on the internet. The Internet is an unsecure network that connects all people across the globe and is one of the major means that businesses use to generate revenue either by selling services, products, ideas. There is a wide span of activity



References: Chen, Kuo Lane, Etnyre, Vance, Lee, Huei. 2003. “Security Management in Intranet Systems”. Communications of the International Information Management Association 3(1): 15-23. “Internet Security Trends”. 2008. A report on Emerging Attack Platformsfor Spam, Viruses and Malware. Cisco and IronPort. “Protecting What Matters”. 2009. The 6th. Annual Global Security Survey.Deloitte. “Information Security Management: Not A Technology Problem”. 2001. Building Comprehensive Information Security Programs. White Paper.

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The best network design to ensure the security of Corporation Techs internal access while retaining public Web site availability consists of several layers of defense in order to protect the corporation’s data and provide accessibility to employees and the public.…

    • 1214 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Corporation Tech will face many security risks with their current network. The user domain is the single most vulnerable part of any network and as such poses the most obvious security risk. To mitigate risks involving the users is to implement policies and training to educate the user on proper use and security best practices. By educating the user on security practices such as secure passwords, safe web surfing, and securing their workstations, many potential attacks can be avoided. Policies and training are also necessary because they can be used as evidence when taking administrative action against a user or intruder in the event the system or data information is compromised.…

    • 612 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Ping sweeps and port scans are two techniques that a malicious computer user such as a hacker can utilize to compromise an Enterprise networks security and gain access to their proprietary data. For example, private email messages can be forwarded to a rogue destination email address: Done by installing a virus program into a user’s email client through a discovered active computers open TCP/IP IMAP port (port number 143) that is not being currently used by that user (Clarke, 2008). The virus then could take advantage of security vulnerabilities in that users email client program and forward emails from that users inbox over to another destination email address without them knowing about it. Therefore, in light of such exploits as just described it is vitally important to address and mitigate the security problem to an Enterprise network from ping sweeps and port scans that can be incurred from outside sources by the use of strong Firewall protections.…

    • 631 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    Department of Finance and Administration, State of Tennessee. (2008). Enterprise Information Security Policies. (Document Version 1.6)…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Good Essays

    Use of a private extension of the internet and confining it to an organization is called an intranet. If the corporation was to build a companywide intranet, all aspects of the business would quickly be able to securely share any part of the organization’s information with one another. A huge benefit with an intranet is the cost-effective feature which is comprised from the utilizing a paperless environment. For example, a company can publish most of the company documents through the intranet Web pages. This saves the company money on printing documents and distributing information, duplication efforts, and documentation maintenance. Another efficient intranet communication is the use of “forms” on the intranet Web pages, such as forms for human resource needs. Payroll documents, expense report requests, and an FAQ section in regards to benefits can be posted for easy access by employees. Manufacturing and Production can also utilize an intranet to convey increased levels of products to sales and marketing so that those departments are aware of trying to move items in anticipation of new stock. Managing projects in a distributed workgroup and virtual team working ensures sharing corporate knowledge and support throughout the company. An intranet is a huge…

    • 1080 Words
    • 5 Pages
    Good Essays
  • Better Essays

    One of the most significant internal uses of the internet in business communication is the intranet site. This is a website that is only available to the members of a particular organization. It typically serves as both a sort of community bulletin board and a place to access forms, information, and other resources that are necessary or helpful for employees. Most intranet sites are password protected and some even have sections which are only available to certain groups of employees.…

    • 2164 Words
    • 9 Pages
    Better Essays