Preview

International Case : Global Car Industry

Better Essays
Open Document
Open Document
1117 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
International Case : Global Car Industry
Computer systems are vulnerable to many threats that can inflict various types of damage resulting in significant losses. This damage can range from errors harming database integrity to fires destroying entire computer centers. Losses can stem, for example, from the actions of supposedly trusted employees defrauding a system, from outside hackers, or from careless data entry clerks. Precision in estimating computer security-related losses is not possible because many losses are never discovered, and others are "swept under the carpet" to avoid unfavorable publicity. The effects of various threats varies considerably: some affect the confidentiality or integrity of data while others affect the availability of a system.
1. Errors and Omissions
Errors and omissions are an important threat to data and system integrity. These errors are caused not only by data entry clerks processing hundreds of transactions per day, but also by all types of users who create and edit data. Many programs, especially those designed by users for personal computers, lack quality control measures. However, even the most sophisticated programs cannot detect all types of input errors or omissions. A sound awareness and training program can help an organization reduce the number and severity of errors and omissions.
Users, data entry clerks, system operators, and programmers frequently make errors that contribute directly or indirectly to security problems. In some cases, the error is the threat, such as a data entry error or a programming error that crashes a system. In other cases, the errors create vulnerabilities. Errors can occur during all phases of the systems life cycle.
2. Fraud and Theft
Computer systems can be exploited for both fraud and theft both by "automating" traditional methods of fraud and by using new methods. For example, individuals may use a computer to skim small amounts of money from a large number of financial accounts, assuming that small discrepancies may not be

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Internet and network security are a primary concern for many businesses. In today 's world, the number of hacks and leaks of data is continuing to rise, which is what makes security the primary concern. What may or may not be apparent is that many breaches of data tend to be caused by internal users ' errors that may not even have been meant to be malicious. Liaskos and Sandy quote a study by Roman which revealed…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    References: Horton, T. (2014, May 1). The Right Technology Fix Can Help Prevent Breaches. Retrieved April 29, 2015, from ProQuest: http://search.proquest.com/docview/1548709638?accountid=458…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cs120 Final Project

    • 636 Words
    • 3 Pages

    Computers have become an important part of our life. We use them in our home, workplace, and at schools. Unfortunately almost every computer user encounters some type of problem. It could be the disaster of your hard drive crashing or even a forgotten password. The increased use of computers has created a high demand for computer technicians to provide help to users, day-to-day administration, maintenance, and maintenance of computer systems and networks. This is why I have chosen Computer Information Science as my major.…

    • 636 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    There are quite a few vulnerabilities that can affect organizations productivity. These vulnerabilities can be environmental, utilities & service, criminal behavior, equipment failure, and information security issues. To protect the organization against loss of productivity and data loss we have created an assessment of the potential danger each category of threat presents. We created a worksheet (located on the last page of this document) listing each type of vulnerability and ranked the probability and severity of each of the threats. Using a probability and severity legend that had one…

    • 2036 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Everyone is familiar with the organization the Red cross, and how many different families and lives they truly have impacted. Many people donate their time and money to help people in need. It is a wonderful organization, but if the team members aren’t fully aware of potential threats that could occur it could be very costly for all of those involved. People depend on the Red Cross when they are in the time of need, such as a Natural disaster. The first threat that I would like to discuss with everyone is in the event of human error thus is events that are either enabled by or caused by human beings, such as unintentional acts (inadvertent data entry) or deliberate actions (network based attacks, malicious software upload, unauthorized access to confidential information). You have to be cautious of everything you’re doing especially when it involves personal information.…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Today we continue to rely on computers and technology more and more throughout our daily lives. Computers are also becoming increasingly powerful and more intelligent. However as computers continue take on more and more of our jobs they are also becoming increasingly vulnerable for errors. “All the troubles of the world” by Isaac Asimov and “Minority Report” were both about computers that are very different. However they both had major flaws in their systems.…

    • 541 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Kizza Chapter *

    • 528 Words
    • 3 Pages

    1. Briefly state the main idea of this chapter. Since software in one form or another controls every computer or computer component, it becomes a more important and fundamental part of our life. Even though we may not understand the languages that make up the software, we must be aware of the elements of software that affect its use. Verification and Validation, reliability, security, safety, and quality are some of the major points examined and brought to light. It delves into the various reasons of why software fails and who is responsible. More importantly, it covers what consumer protection exists and the rights of software buyer's.…

    • 528 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Double Deceit Summary

    • 1476 Words
    • 6 Pages

    The reality is that fraud is a growing epidemic that is unavoidable in other words it can very well happen to anyone at any time. As shown by Statistics Canada, Fraud, the most common property violation, accounted for 54% of all cybercrimes reported to police in Canada in 2012 (Star 1). As a result, educating oneself in strategies on how to detect fraud can help one decide in avoiding common mistakes most people make, especially fraud schemes which can be prevented. Applying these practices on a corporate level will reduce costs in investigating fraud claims, and would allow businesses to make better decisions that would benefit the economy in the long run. Moreover, realizing that an honest person with personal integrity could still commit fraud, there are motives, situational pressures, and many other reasons that drive regular people to commit…

    • 1476 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Refining Solutions

    • 947 Words
    • 4 Pages

    Next, stem off from the answer of the first question, how does one better anticipate computer glitches and improper operations?…

    • 947 Words
    • 4 Pages
    Good Essays
  • Good Essays

    I would like to start off by saying that there are various threats when discussing about computer security the word threat would mean something that can indicate a danger when in relation to computer security. In this task I will be showing the Malicious damage, counterfeit goods, (software/hardware) human errors, phishing and hacking, theft of equipment, threats related to e – commerce and technical failure.…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    THE DEFINITION The International Monetary Fund defines globalization as the growing economic interdependence of countries worldwide through increasing volume and variety of cross-border transactions in goods and services, free international capital flows, and more rapid and widespread diffusion of technology. Meanwhile, The International Forum on Globalization defines it as the present worldwide drive toward a globalized economic system dominated by supranational corporate trade and banking institutions that are not accountable to democratic processes or national governments. While notable critical theorists, such as Immanuel Wallerstein, emphasize that globalization cannot be understood separately from the historical development of the capitalist world-system the different definitions highlight the ensuing debate of the roles and relationships of government, corporations, and the individual in maximizing social welfare within the globalization paradigms. Nonetheless, it is clear that globalization has economic, political, cultural, and technological aspects that may be closely intertwined. Given that these aspects are key to an individual's quality of life, the social benefits and costs brought upon them by globalization generate strong debate.…

    • 1931 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    over long periods of time, or when a computer operator uses a computer to steal…

    • 1442 Words
    • 6 Pages
    Powerful Essays