Preview

Cyber Security

Satisfactory Essays
Open Document
Open Document
312 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Security
Dear CEO, There are many security problems faced today with the cyber space. Problems such as

privacy, personal information, and even in the inner workings of a corporation. There are many

way to protect yourself from these intruders and attackers. It should be implemented that

constant updates, a virus protection program, and a malware protection program should

be used on a daily basis to update its database since the internet is ever changing and

people are finding new ways to get around these protocols. The more that cyber space grows as

an entity, the more vulnerable it is to obtaining secrets that people would try to hide.

Those people can use those secrets against not only us, but our government. Imagine

Someone breaking into your computer and accessing your ghost drives that you thought only you

knew about, now you have a problem. Everything you tried to keep a secret is now about to be

made public. There are a few options that I would use to make sure this never happens.

When hiring someone do a good background check with techs checking it, constantly watch how

people use their computers and reprimand them for using it inappropriately, and if it comes down

to it then take someone to court for trying to access the companies information for their own

benefit. Privacy statements for every job also have a great place , so in the case of someone

trying to steal documents it can be used against them.

The more we are aware of what goes on in the work place the better can we keep

control of how our employees and what they do with their time. Some site they access can give

you virus’s and backdoor worms. We as a company just need to have a better understanding

of how the internet works and how to protect ourselves.

Thank You

You May Also Find These Documents Helpful

  • Good Essays

    4) ______ issues involve who may obtain information and how much they should pay for this information…

    • 946 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Passwords – for example sharing passwords, insecure passwords, storing username and passwords in public web browsers. This makes your security level low giving easy access to hacker and viruses.…

    • 914 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Most businesses have different information about people working for them, that's when the Data Protection Act 1998 protects the information held about people being misused.…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    inviolate or the disclosure of which would be embarrassing or would likely be detrimental to…

    • 547 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Abuse Concerns. Low scorers use their workplace computers only for work-related uses. High scorers use their computers in ways that are unrelated to their work activities or are disruptive to their…

    • 557 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 351 Words
    • 2 Pages

    Depending on the individuals position and job requirements, they should only be able to access the information that they need to do their job and nothing more.…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ethical Behavior Quiz

    • 5293 Words
    • 22 Pages

    | Ethical issues in corporate intelligence are broad and usually illegal except for obtaining information through:…

    • 5293 Words
    • 22 Pages
    Satisfactory Essays
  • Good Essays

    Any information that is personally identifiable just isn't said and researched by immediate Checkmate when you consider that it is covered via unique applicable legal guidelines. All the information which is stored in public documents should no longer be disclosed because it involves targeted touchy expertise as well. For this reason, there are quantity of legal guidelines which are running to regulate the authorized use and openness of the expertise. Important act of all of them is…

    • 796 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Cyber Security

    • 368 Words
    • 2 Pages

    I have a multitude of passwords to memorize in an effort to maintain my privacy and security. It is unfortunate that cyber world users must constantly deploy measures to keep their personal information private. Before this class I was certainly aware of the potential dangers that could occur in cyberspace, prevention always has been my goal. I have security protection in place against attacks such as viruses, spam, malware, spyware, and adware and I ensure that the protection is up-to-date as it is essential part of prevention is to remain current. Other security measures an average user may do is to maintain their system is to allow Microsoft Windows to perform automatic updates. These updates can provide additional security measures to the system info structure. Running regular maintenance such as a system defragmentation will keep the system up-to-date and in proper order. The average user should also password protect their personal information. If the wireless network James used had been password protected James would not have had the opportunity to enter the network without first inputting the password.. I would feel violated to know that someone was using my wireless network without my authorization I would be horrified to know that individual was plundering through my private things. Securing a personal computer and a wireless network with a password is extremely important otherwise the system is open and vulnerable toward an attack. Furthermore, James was placing himself at risk by entering an unknown unsecured network. When I review the network settings on my wireless network I am able to view data, websites and activity going through my network. I enjoy this feature because I am able to see what my children are doing when they are online. I teach my boys how to protect themselves while online. In the future I plan to remain aware of any potential treats and I will review any new…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ms. Atkins cautioned organizations to prescreen job applicants. As a matter of fact, wise companies do not offer employment until after a candidate's background has been checked. Just the mention of a background check is enough to make some candidates withdraw. These candidates, of course, are the ones with something to hide.…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It is agreeable that there are some situations that should not be immediately disclosed to an organization. The question is how one can decide what falls into this category? There is no doubt that transparency is…

    • 589 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Gives individuals the right to know what information is held about them and provides a framework to ensure the personal information is handled properly.…

    • 475 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Information Security

    • 813 Words
    • 4 Pages

    Information security:is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction it has also be define as the protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats.…

    • 813 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Cybersecurity Resolution

    • 3606 Words
    • 15 Pages

    SIGNATORIES: The Kingdom of Saudi Arabia, The French Republic, The Republic of the Philippines, Democratic Republic of Algeria, The Russian Federation, The Republic of Croatia, The Republic of India, The Republic of Tunisia, United States of America, The Islamic Republic of Afghanistan, The Argentine Republic, The Commonwealth of Australia, The Republic of Azerbajian, The Kingdom of Bahrain, The People’s Republic of Bangladesh, The Kingdom of Belgium, The Federated Republic of Brazil, The Kingdom of Cambodia, Canada, The Republic of Chile, The Republic of Colombia, The Republic of Croatia, The Republic of Cuba, The Czech Republic, The Democratic People’s Republic of Korea, The Democratic Republic of Congo, The Arab Republic of Egypt, Georgia, The Federal Republic of Germany, The Republic of Ghana, The Republic of Guatemala, The Republic of Indonesia, The Islamic Republic of Iran, The Republic of Iraq, The Republic of Ireland, The State of Israel, The Italian Republic, Jamaica, The Republic of Kenya, The State of Kuwait, Laos, Libya, Luxembourg, Malaysia, Mauritius, Mexico, Morocco, Namibia, Netherlands, New Zealand, Nigeria, Norway, Pakistan, Paraguay, Peru, Poland, Portugal, Qatar, Republic of Korea, Rwanda, Serbia, Spain, Sri Lanka, Sudan, Sweden, Switzerland, Syria, Thailand, Togo, Turkey, Uganda, Ukraine, UAE, UK, US, Venezuela…

    • 3606 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    It may have been a phenomenon for the ancient generation but in the 21st century the computer is a very common thing. Everybody uses the computer for any and everything. One can virtually multi-task while using this machine. In today’s world the computer bears a number of effects on its users.…

    • 552 Words
    • 3 Pages
    Good Essays

Related Topics