Preview

Contemporary Security Issues

Good Essays
Open Document
Open Document
649 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Contemporary Security Issues
CCJS 345
Cotemporary Security Issues
2/19/2014

Cyber security has been slowly taking over as the main concern for security professionals as well as organizations. This is due to a larger emphasis on using paperless methods in order to keep track of customer’s data, financial records as well as many other important documents. Without properly trained IT professionals as well as an increase in maintaining up to date security these attacks will continue to have success. Another issue is the lack of legislation regarding cyber crime and their perpetrators.
Although billions of dollars are spent by organizations and governments in order to protect digital assets news of attacks are reported on, which many times are successful. Despite the fact that myriad tech risks were identified by the study’s 469 participants, many firms aren’t making the grade when it comes to putting the necessary protections in place to combat these threats. Specifically, one-third of organizations with less than $100 million in revenue said they did not conduct any form of IT audit risk assessment, while 42 percent of all surveyed firms reported that in lieu of their own internal resources, they depended on external assistance to inform their IT audit departments. (Caldwell Partners, 2014) Given the large amount of media attention given to cyber-attacks, the lack of internal attention given to cyber security is astonishing. While budget constraints are one factor contributing to a lack of security without integrating some form of internal risk assessment, companies cannot hope to achieve the highest level of security possible. Without consistently updating security systems organizations are leaving themselves open to attacks from outside individuals. This is due to cyber perpetrators constantly looking for ways to side step or penetrate security systems in order to achieve their goals. While the goals of these perpetrators range from



References: Partners, C. (2014, January 24). Addressing the ongoing problem of IT security. Caldwell     Partners. Retrieved February 19, 2014, from     http://www.caldwellpartners.com/addressing-the-ongoing-problem-of-it-security/ Ali, S., Dixon, J., &Padmanabhan, V. (2014, February 12). Why cybersecurity is a strategic     issue. Bain Brief. Retrieved February 19, 2014, from     http://www.bain.com/publications/articles/why-cybersecurity-is-a-strategic-    issue.aspx Cooney, M. (2014, February 5). US Secret Service: Stronger laws could help fight sophisticated     cybercrime. Network World. Retrieved February 19, 2014, from     http://www.networkworld.com/community/blog/us-secret-service-stronger-laws-    could-help-fight-sophisticated-cybercrime

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Unit VIII, Question 11

    • 444 Words
    • 2 Pages

    Cyber crime is a major concern facing the general public today, due to the fact that you have a lot of people trying to infiltrate the government, the high increase on identity theft online and the high increase on credit card scam. For example, if military personnel leave there Common Access Card (CAC) card in their computers and a criminal steal the card give them access to lots of government document. Those issue requiring law makers and law enforcement agencies to take action throughout our nation. I think everyone should be aware of cyber threats and the actions they can take to protect their own information. The President recently…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Mod 1 Case Assingment

    • 1465 Words
    • 5 Pages

    The governance framework is very important because it gives us a road map for the application, evaluation and improvement of information security practices (Information Security Governance: Toward a Framework for Action). This frame work includes legislation, regulations, corporate structure, corporate culture and the importance of information security to the organization. It also acts as a mechanism to deliver value, mange performance and also mitigates risk. Another important fact about this framework is that it gives us a way to assign accountability for each decision and performance. It ensures that policies, procedures, management and other related management…

    • 1465 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    My doctoral study topic focuses on internet security for businesses. Internet security is a broad topic that involves a multitude of theories, beliefs, recommendations, and guidelines. My article selections detailed a synopsis of the government’s responsibility and the end users obligation to internet security. In addition, the annotated bibliographies give the reader a summarization of the article through it 's main focal points. The two articles below are for my doctoral study.…

    • 380 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Whitman, M., & Mattord, H. (2010). Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    The rapidly evolving economy has led to companies being largely controlled by an IT infrastructure as it is an important part of business operations, and it bridges communication gaps well. Those corporations that pay no heed to the necessity of computer forensics in the modern age risk damage to digital resources and intellectual property. A singular breach into the system can lead to massive financial loss[1]; subsequently leading to bad publicity of the business and prolonged losses in the long run. The methods used by attackers to breach into networks are constantly advancing as a result of experts who are able to fend off attacks. This is a cause for concern for experts worldwide. It is important to bear in mind that threats can be both…

    • 217 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Penetration Testing

    • 3406 Words
    • 14 Pages

    As electronic commerce, online business-to-business operations, and global connectivity have become vital components of a successful business strategy, enterprises have adopted security processes and practices to protect information assets. But if you look at today's computing environments, system security is a horrible game of numbers: there are currently over 9,223 publicly released vulnerabilities covering known security holes in a massive range of applications from popular Operating Systems through to obscure and relatively unknown web applications. [01] Over 300 new vulnerabilities are being discovered and released each month. Most companies work diligently to maintain an efficient, effective security policy, implementing the latest products and services to prevent fraud, vandalism, sabotage, and denial of service attacks. But the fact is you have to patch every hole of your system, but an attacker need find only one to get into your environment. Whilst many organisations subscribe to major vendor's security alerts, these are just the tip of the security iceberg and even these are often ignored. For example, the patch for the Code Red worm was available some weeks before the worm was released. [02]…

    • 3406 Words
    • 14 Pages
    Powerful Essays