Preview

Information Security and Managment

Powerful Essays
Open Document
Open Document
2132 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security and Managment
Contents
Newspaper Articles on Information Security Threats 2
Methods of Spreading Awareness 3
Potential Threats 5
Classified Letter 6
References 9

Newspaper Articles on Information Security Threats
The number of articles found, discussing and reporting the threat to information security were four. A brief summary of each is given as follows:
The first article was the threat posed due to the malware viable and distributed on the internet. The social networking websites and other free sources of software are major source of such malware. The content comes to the user disguised as a message or a statement from a friend. It turns out to be a collection of malware and virus which affect an individual’s computer in drastic form. These malware are easy to install and one or two wrong step on the part of the users can result in large problem. Such malware are difficult to identify and occur on daily basis. If activated by mistake, they may result in loss of large amount of data crashing of an individual’s computer, or even loss of memory. The article goes on to warn online users to be aware of the potential threats posed and be extremely careful while opening such software on one’s computer.
The second article discussed the threat posed to information security via the hacking of one’s internet addresses. The massages sent via such sources are normally spam or virus in nature. This also leads to the person, whose email id is being used to send such messages. It also happens that the mails sent may be derogatory in nature and may lead to stressful conditions in a person’s life. The best way to prevent such conditions is to keep all forms of identification personal, and to not use any form of public computers.
The third article discussed the lack of information security provided by mobile phone networks. With the advent of the smart phones and the usage of the internet becoming a daily process on one’s mobile phone, the attacks on information security have



References: * Gudena, C. (2008). Information Security Awareness * De Borchgrave, A., Cilluffo, F. J., Cardash, S. L., & Ledgerwood, M. M. (2001).Cyber threats and information security: meeting the 21st century challenge (p. 57). CSIS Press * Whitman, M. E. (2003). Enemy at the gate: threats to information security.Communications of the ACM, 46(8), 91-95 * Whitman, M. E., & Mattord, H. J. (2011). Principles of information security. Course Technology Ptr

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Good Essays

    Lab 1 Biochem

    • 502 Words
    • 3 Pages

    PNP or paranitrophenol is an organic compound that undergoes changes when the pH is manipulated of the solution. PNP is also an acid/ base indicator. The compounded starts off as internal conjugated ring with the hydroxyl group and the nitro group single bonded to the aromatic ring. This occurs at the pH of 5. At this point the aromatic compound is colorless and is in the ultraviolet range. However, as the pH begins to increase the hydroxyl group deprotonates, leaving the oxygen with a negative 1 charge. The molecule compensates for the negative charge by conforming to a more stable resonance structure. The structure now has the oxygen and the nitrogen for the nitro group double bonded to the ring. The negative charge lies with one the oxygen atom that is a part of the nitro group. This lead to a highly conjugated system. If a system is conjugated the compound shows the presence by giving off a color. In PNP the color change is most visible at the pH of 10.…

    • 502 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Whitman, M. E. (2011). Readings and Cases in Information Security: Law and Ethics. New York, NY: Cengage Learning.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2011). Readings and cases in information security: Law and ethics. Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    MacSweeney, G. (2000). When "I love you" isn 't so sweet. Insurance & Technology, 25(7), 7.…

    • 680 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Whitman, M., & Mattord, H. (2010). Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Tale of Two Cities

    • 737 Words
    • 3 Pages

    When has anything in life ever been free? Has it ever been possible for a person to achieve success, happiness, or any measure of achievement without sacrifice? Sacrifice is a recurring theme throughout A Tale of Two Cities because it is a necessity for any justice or happiness achieved in the novel. The sacrifices made in A Tale of Two Cities consist of sacrifice to the state, sacrifice of others, as well as self-sacrifice for others.…

    • 737 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Antivirus 1

    • 353 Words
    • 2 Pages

    [1] Bulowski points out that most antivirus programs also protect against worms and Trojan horses (Bulowski, 2008)…

    • 353 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Mobile devices such as smartphones, PDAs, tablets, and netbooks have become an integral part of everyday business operations. Millions of people log into their company’s secure network on mobile devices via wireless Internet or even accessing their email, making sensitive data more susceptible to data theft and hacking. Mobile technology is advancing at such a fast pace, making it harder for IT managers to keep up with newly emerging threats. Since the smartphone emerged in the business scene, cybercrime has increased exponentially. Data security has now become the main focus for most IT managers in larger corporations.…

    • 1078 Words
    • 5 Pages
    Powerful Essays