Preview

It Security

Powerful Essays
Open Document
Open Document
1949 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It Security
Computer security and Network Security is the means by which business and governments are protecting against computer intrusions and attack to prevent loss of data, information and provided services. Everything is now on computers, peoples whole lives are documented on computers. Big business and the government rely on technologies that use computers, whether it is used for storage, a medium between the customers and themselves or actual work. With all this information and data being stored, transferred and used it needs to be secured. A bank is open to the public; you would not have this bank unsecured would you? There would be security guards, cameras, and a vault. The same mentality to secure your data should be implied if you have a network that is connected to the Internet. You should have software, hardware, and/or personnel monitoring your networks operations and security. All computers and systems that connect to the internet or networks run off software of some type. People called hackers or crackers, manipulate programs, create worms, and viruses to make systems do thing there not supposed to, access places they aren’t allowed, and shutdown or hinder a system from working properly (Dasgupta). Then there are attacks, phishing attacks which come in the form of email that try to lead you to fraudulent sites, Denial-of-service attacks overload servers causing no one to get on or shuts them down. Then there are SQL injection attacks which are used in security vulnerable web apps, it’s a code that pulls information from the database and sends it back to the hacker, these are just a few of the many threats posed today by hackers ("Top Cyber Security Risks- Origin and Destination", 2009).
Cyber security threats are on the climb as cyber criminals persist to increase innovative ways to use breached computers for their own personal agenda. Establishments all have different types of information they need to protect, the government has information that



References: Abbate , J. (2000). Inventing the internet . Cambridge : MIT Press Retrieved from http://site.ebrary.com/lib/westerngovernors/docDetail.action?docID=10225299&p00=internet history Dunn , M Jameson , R. (2008, October 16). October is national cyber security month. Retrieved from http://www.bsa.org/country/News and Events/News Archives/en/2008/en-10162008-cyberchamp-DuBoseGood.aspx Thomas , D Travers, M., & Black & Veatch , (2008). Cyber security.Transmission& Distribution World, 60(11), 23-27. Retrieved from http://search.proquest.com/pqcentral/docview/211162108/fulltextPDF?source=fedsrch&accountid=42542 Dasgupta, P Top Cyber Security Risks- Origin and Destination. (2009). Retrieved from http://www.sans.org/top-cyber-security-risks/origin.php Lane, S Baker, W., Tippett, P., & Goudie, M. (2010). 2010 Data Breach Investigation Report. Retrieved from http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 2 RFP Bidder’s Conference © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    Kim, D. & Solomon, M. G. (2012). Fundamentals of information systems security . Sudbury, MA: Jones & Bartlett Learning, LLC.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Mallery, J., Zann, J., Kelly, P., Noonan, W., Seagren, E., Love, P., et al. (2005). Hardening Network Security. New York, NY: McGraw-Hill.…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Welcome to Foundations of Cybersecurity CSIA 301, a hybrid course. My name is Professor Nancy M. Landreville and I have been teaching here at the University of Maryland, University College since February 2007. My phone number is (301) 401-0144. You may contact me by phone any evening during the week (Monday - Friday) from 7:00pm - 9:00pm. You may email me at any time at nancy.landreville@faculty.umuc.edu . I encourage you to use the private messaging area rather than the faculty email address. This will facilitate faster response to your course questions. I will respond to your email within 24 hours from receipt of your email. Please place the name of the course in the subject line so I know the email is from one of my students. I check email every day from my students. I encourage you to contact me with any questions about the course, require that you contact me for extenuating circumstances for late work, and meet with me online for any required conferences that are held during the course. We will meet in the online chat room at least once this semester to discuss the midterm and once this semester to discuss your final assignment. This is in addition to your required face-to-face attendance each week for eight weeks.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    9/11 and Airport Security

    • 3569 Words
    • 15 Pages

    McClure, George. "IEEE-USA Today 's Engineer." 02.12 Ieee-usa Today 's Engineer. 2007. Web. 21 Feb. 2012. http://www.todaysengineer.org/2005/Jun/security.asp…

    • 3569 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Sec 280 Week 1

    • 667 Words
    • 3 Pages

    In today’s age with more and more computers being connected to the internet every day the presence of these new users on the global network creates an issue of security. Common questions might be as follows, how do I keep my network secure from the outside world? What can I do as an individual to keep us safe? Can we implement any new policy’s to counter this threat? These are all great questions and it is my task to answer these question first I must begin by explaining what threats we face and how to deal with those threats accordingly.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Refer to the handout Testing and Monitoring Security Controls. It contains information on security events or breaches and baseline anomalies.…

    • 1066 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit VIII, Question 11

    • 444 Words
    • 2 Pages

    Cyber crime is a major concern facing the general public today, due to the fact that you have a lot of people trying to infiltrate the government, the high increase on identity theft online and the high increase on credit card scam. For example, if military personnel leave there Common Access Card (CAC) card in their computers and a criminal steal the card give them access to lots of government document. Those issue requiring law makers and law enforcement agencies to take action throughout our nation. I think everyone should be aware of cyber threats and the actions they can take to protect their own information. The President recently…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Bibliography: U.S. Department of Homeland Security. (n.d.). Cyber-Security. Retrieved from Department of Homeland Security: http://www.dhs.gov/cybersecurity…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Bibliography: Kim, David and Michael G. Solomon. “Fundamentals of Information Systems Security.”, 15-42. Sunbury, MA: jones and Bartlett Learning, 2012.…

    • 517 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Incident Response Plan

    • 930 Words
    • 4 Pages

    In the age of rapidly evolving technology, it is important for all businesses, large or small, to have an incident response plan (IRP) set in place in the event of a cyber-attack. The idea of an IRP is based on preparing for and responding to unforeseen, negative events that may affect a business or organization. Today, it is more of a question of when these cyber-attacks will occur rather than if they will occur. The IRP incorporates many fundamentals to help in these instances, such as, prevention, preparation, planning, incident management, recovery, mitigation, remediation, post incident analysis, and lessons learned. It is recommended that XYZ Retail Company implement the following guidelines to best prepare for a cyber-attack.…

    • 930 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    References: Defense in Depth: It is more than just the technology; retrieved on February 20, 2012 from www.isa.org/intech…

    • 1927 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    information security

    • 528 Words
    • 3 Pages

    IT security: Sometimes referred to as computer security, Information Technology Security is information security applied to technology (most often some form of computer system). It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory (even a calculator). IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. They are responsible for keeping all of the technology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or gain control of the internal systems.…

    • 528 Words
    • 3 Pages
    Good Essays