Preview

IS 577: Case Studies In IT Security

Good Essays
Open Document
Open Document
787 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS 577: Case Studies In IT Security
Ravi Peruri
IS 577: Case Studies in IT Security Mgmt. and Ethics

Introduction
With the various customization of web applications, security is gradually improving, many project managers, implementation partners, and IT developers are still unaware of vulnerabilities that can expose sensitive and institutional data, data loss, or poor data quality. Combining security with the Software Development Life Cycle sometimes requires additional practical training, an overview of existing practices, and might require a transformational change. An organization-wide focus, where every employee/contractor participating in a software development needs to put in a collective effort and moral responsibility to deploy the code and securing web
…show more content…

The moral code of ethics and conduct defines the performance indicators, compliance training, accounts-auditing, and business reporting guidelines across five areas of responsibility.
Four main Ethical Concerns in IT Security
Security: With the rise of internet, intruders have found it easy to hack into any system as long as it is connected via internet/network. They can easily use the address to access a system and steal data for various reasons.
Privacy Issues: As IT enabled us to share and search relevant information over the internet had exploited the freedom of privacy in various ways such as by the use of streaming webcams and use of social networks.
Copyright Infringement: IT has made it easy for users to access any information at any point of time. With the rise and development of content sharing networks and photo sharing sites, many original owners of these works are completely losing the trustworthy of their works, because users of IT can easily gain access and share that data with friends which is good news for the downloaders because it is free, but the effort of original creators of these works are compromised. Recently, the federal government has closed few websites like file-sharing (mega upload, file sonic,
…show more content…

• Describe the standards, best practices and terms for development and support of systems. This document should outline the roles and responsibilities, approach for planning and management across the SDLC, and include templates for analysis of data privacy and retention.
2: Effective Training to the employee
• Any system would fail, if the project managers, developers, and business users aren’t educated on security concerns, and laws pertaining to it.
3: Scope the Security requirements at initial stage
• How personal/confidential data should be protected?
• Any Compliance requirements - HITECH, HIPAA, etc.?
• How to store and secure log files?
• What is the data retention period?
• IT security assessment in case of breach.
4: Have a IT Security officer
5: Frequent security checkup and mock drills
• Use code reviews including security and


You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Global Limited has a reputation of being one of the world’s leading providers of infrastructure information systems, software, and services around the world. They are in need of a better business and security practices. They have identified a problem which has been likened to a game of Whack-a-mole. To help with its security problem, Global as called upon the knowledge of CIS-its own Security Division. One of the first steps is to understand what information is critical to the business initiatives. Global Cadence is front-end for over 40 applications and has for 200,000 registered users. Global is working to minimize its impact.…

    • 406 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This is when the hacker places a back door that could be done by installing a program that can give the hacker unlimited access to the database anytime which could compromise any important data such as customer personal information or even company information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The only zero cost opportunity, standardizing polices and procedures, is also the most difficult. Processes for incident response, patch management, and preventative maintenance must be developed, refined and communicated to the appropriate staff. Incident response processes must further be exercised so all incident responders know exactly what to do in the event of a (D)DoS. Development and deployment policies must be developed defining the process for development and deployment and use of University owned and managed computing devices. Security must be forefront-outlining security in the software development life cycle (SDLC) for both University developed applications and off the shelf applications.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The basic objectives and standards of the code of ethics states that every employee will apply principled conduct toward each business associate, customer, and vendor. The code further states that when providing the products and services to the customers, every employee must follow the laws and regulations of the ethical code with integrity and respect. The purpose for the code is to assist each employee in complying with the advanced principles that the management team and board of directors designed and approved. The code also identifies how to comply with the applicable laws and regulations.…

    • 252 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Each business should have a framework for ensuring ethical behavior. The structure, format, and scope of codes vary depending on the company’s business. An oil company's code, for example, would probably have different criteria and emphases than a healthcare provider's code of ethics. Sometimes, codes of ethics are called by other names, such as an employee code of conduct. A code of ethics, though, should be differentiated from standard good operating practices.…

    • 655 Words
    • 3 Pages
    Good Essays
  • Good Essays

    1. Identify the touch points between the objectives and requirements of PCI DSS and YieldMore’s IT environment.…

    • 619 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    GBDA 303 Chapter 7

    • 366 Words
    • 4 Pages

    • There are several privacy issues related to the use of online / computer resources.…

    • 366 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Better Essays

    There are several things a manager has to consider when running a business. He or she must ensure that the company does what it needs to meet the needs of the customer, the employees, and protect all personal information. One way is to ensure that there are proper security measures to protect all data by making sure the employees are trained and understand the security protocols. Another way is by using the Systems Development Life Cycle (SDLC) method to help maintain the systems they have or need to conduct business. Businesses that follow the steps in the SDLC method and maintain a good information security system will keep the trust of its customers ensuring it remains profitable.…

    • 2427 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Computer Ethics

    • 897 Words
    • 4 Pages

    Piracy which by definition is reproduction, distribution and use of software without permission of the owner of copyright, poses some serious ethical problems. The free exchange of copyrighted materials is piracy as it undermines the ability of copyright holders (and their representatives) to control the sale and distribution of goods to which they—and only they—own the rights. Probably the best known and most widely practiced form of piracy is the distribution of copyright protected music files via popular file sharing programs such as Kazaa and Limewire. As bandwidth increases, the "sharing" of movies and television shows on the Internet is likely to increase as well. Although file sharing is quite common, that does not mean it is okay.…

    • 897 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Hotel Management System

    • 7043 Words
    • 29 Pages

    Hotel Management System is a software system where the management of entire hotel is computerized. The hotel management system is designed using visual basic.net as the rich GUI for front end and MS-Access as the secured backend database.…

    • 7043 Words
    • 29 Pages
    Powerful Essays