Preview

Common Information Security Threats

Better Essays
Open Document
Open Document
1179 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Common Information Security Threats
Common Information Security Threats
September 22, 2012

Common Information Security Threats
As company’s dependence on computers and the internet increase, there are more and more threats that they face from hackers and anarchist alike. For ever solution that companies come up with to defend themselves against cyber attacks, those who wish to do harm find other means to attack, it is a constant cat and mouse struggle. If 2011 has been any indication, it is clear that everyone is vulnerable to cyber attacks. There was wave after wave of hacking, malware, and spear-phishing attacks that succeeded in exploiting many well-known businesses, such as RSA and Sony, which lead to the exposure of millions of records. (Schwartz, 2012) The purpose of this paper is to discuss three of the top information security threats that any business and organization face today: breaches, cyber espionage, and mobile malware. A breach is when there is unauthorized access to someone’s personal information for means to collect, use, or to disclose. These breaches happen mostly when the information is stolen, lost, or disclosed by accident (e.g., a computer containing personal information is stolen or the information emailed to the wrong people by accident.). Breaches may also be a result of errors in an organization’s procedure. Such information that is stolen can belong to a customer, patient, client, or employee. Once a breach has been identified, the organization must take immediate action to address the incident and reduce any additional risk that results from the event. This is when redundancy becomes very important in enterprise architecture because organizational information systems provide a failover mode that helps to ensure that failed components trigger the appropriate backup components with similar capability. Another common threat that companies face in terms of information security is cyber espionage. This practice is when secrets are obtained without the



References: Friedman, J., & Hoffman, D. V. (2008). Protecting Data on mobile Devices: A Taxonomy of Security Threats to mobile Computing and Review of Applicable Defenses. Information knowledge Systems Management, 7(1/2), 159-180. Kerr, D. (2012, October 15). FBI Warns Users Of Mobile Malware. Retrieved from http://news.cnet.com/8301-1009_3-57532937-83/fbi-warns-users-of-mobile-malware/ Locke, G., & Gallagher, P. D. (2011, March). Enterprise Architecture. Information Security, 800(39), 17-19. Podszywalow, M. (2011, November 29). How to Detect and Stop Corproate Cyber Espionage. Retrieved from http://www.thedatachain.com/articles/2011/11/how_to_detect_and_stop_corporate_cyber_espionage Roberts, P. (2012, June 229). U.S. Congress Hears Of Growing Cyber Espionage Threat to U.S.. Retrieved from http://threatpost.com/en_us/blogs/us-congress-hears-growing-cyber-espionage-threat-us-062912 Schwartz, M. J. (2012, January 17). 10 Security Trends To Watch In 2012. Retrieved from http://www.informationweek.com/security/vulnerabilities/10-security-trends-to-watch-in-2012/232400392

You May Also Find These Documents Helpful

  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    Marsan, C. D. (2009, June 9). Hidden Threat on Corporate Nets: Misconfigured Gear. Retrieved April 4, 2011, from CIO: http://www.cio.com/article/494522/Hidden_Threat_on_Corporate_Nets_Misconfigured_Gear…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Internet and network security are a primary concern for many businesses. In today 's world, the number of hacks and leaks of data is continuing to rise, which is what makes security the primary concern. What may or may not be apparent is that many breaches of data tend to be caused by internal users ' errors that may not even have been meant to be malicious. Liaskos and Sandy quote a study by Roman which revealed…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    The purpose of this paper is to explore and assess computer security as it relates to Aircraft Solutions. Aircraft Solutions provides products and services to a range of companies that require highly specialized skills. Information is accessed by internal and external users via their Business Process Management system.…

    • 1345 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Determine reasonably foreseeable internal threats that could result in unauthorized disclosure, misuse, alteration, or destruction of customer information or information systems, assess the likelihood and potential damage of these threats, taking into consideration the sensitivity of customer information, and evaluate the sufficiency of existing policies, procedures, customer information systems, and other safeguards in place to control…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Data breaches and cyber-attack frequency has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and a company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of a Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident.” (Ponemon Institute, 2013)…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Acc205 Final Paper

    • 1287 Words
    • 6 Pages

    References: Kelly, M., & 42 staff. (2011, June 10). Cyber crime represents a growing threat, FBI agent tells…

    • 1287 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Technologic advances occur at a rapid pace, with new devices coming out at frequent intervals. These new devices are appealing to college students who want to do everything as quickly and easily as possible. Because of the numerous smartphones, tablets, and laptops used by students and employees, college campuses face various security issues from mobile devices that connect to the network, often unintentionally.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    When an organization uses and relies on computer systems and information technology to assist in running their company(s) and also uses these resources to store important, personal information about clients, customers, employees, and the organization itself, it is important to have the adequate security protection in place to prevent this information from being compromised. The following summary will discuss how IBM prevents security breaches by using technology to reduce the rampant crime committed against them.…

    • 555 Words
    • 3 Pages
    Good Essays
  • Good Essays

    An information system security breach could result in serious financial losses, the disclosure of protected private information, loss of research and development data or fines by regulatory agencies. Losses due to intrusions into an information system could negatively affect the general public (i.e. power failures). This might result in costly class action lawsuits that could exceed an organization's ability to pay and result in its dissolution. Even an individual might be sued for negligence and be financially ruined.…

    • 532 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Data Breach

    • 3998 Words
    • 16 Pages

    In today’s digital world, most Americans leave long electronic trails of private information wherever they go. But too often, that data is compromised. When they shop—whether online or at brick and mortar stores—retailers gain access to their credit card numbers. Medical institutions maintain patient records, which are increasingly electronic. Corporations store copious customer lists and employee Social Security numbers. These types of data frequently get loose. Hackers gain entry to improperly protected networks, thieves steal employee laptops or disgruntled workers pilfer company information.…

    • 3998 Words
    • 16 Pages
    Better Essays
  • Satisfactory Essays

    Cyber Espionage

    • 943 Words
    • 4 Pages

    The aim of this report is to examine the topic of cyber espionage. Due to the increase in Internet usage incidents and threats of espionage committed through cyberspace have become frequent headlines in news stories in recent years, thus the existence of cyber espionage is undeniable. This report begins with an introduction of the topic, followed by a literature review. Moving on, the issues involved in Cyber Espionage with its legal aspect and case study following the international cooperation.…

    • 943 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Espionage

    • 4042 Words
    • 17 Pages

    Cyber espionage is not only committed for commercial benefits but it may also be motivated by patriotic feelings resulting in cyber assaults on businesses and other governmental computer systems.…

    • 4042 Words
    • 17 Pages
    Good Essays
  • Powerful Essays

    The data that can executed as a program is called mobile code. The code can be pre compiled on the recipient’s processor for immediate execution and compiled for subsequent execution. It also as a software transferred across a network, transferred between systems, and executed on a local system without explicit installation by the recipient. Network protocols almost come out the issue of heterogonous hardware platforms where byte order of multi-byte integer representations.…

    • 1109 Words
    • 5 Pages
    Powerful Essays