Preview

Internet Security Challenges Analysis

Good Essays
Open Document
Open Document
2004 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internet Security Challenges Analysis
Question no. 1: Discuss the issue of security challenges on the Internet as that issue applies to a global enterprise. List at least 5 Internet security challenges.

ANSWER:
Challenges associated with Internet security are a great concern for companies doing businesses online, users and service providers. These include the following issues:
• Protecting web applications: They are established to enhance availability and access to everyone whether on phone or kiosk. Typically they use simple passwords that can be easily hacked.
Security of personal and confidential data of users: Many businesses are increasingly carrying out financial transactions over the internet, and when hackers intruding with high value, financial and confidential data
…show more content…
Denial-of-service attacks (DoS): Flooding server with thousands of false requests to crash the network.

Identity theft: Theft of personal Information (social security id, driver’s license or credit card numbers) to impersonate someone else

Phishing: Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data.

Evil twins: Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet

Software vulnerability: Commercial software contains flaws that create security vulnerabilities

Question no. 3: You have just been hired as a security consultant by MegaMalls Inc., a national chain of retail malls, to make sure that the security of their information systems is up to par. Outline the steps you will take to achieve this.
ANSWER:
If I just got hired as a security consultant by Mega Malls Inc. the security measures that I will apply will lead to following steps which are as follows:
• The first step for me will be to understand what my company information system wants begin with what data and processes are important and essential to the
…show more content…
How helpful are these?

Sales force in security provision has list down various threats which online user may faces which includes virus/malware suspicious calls as salesforce comprehends that the privacy, reliability and accessibility of information of customer is important for the conduct of business and their profitability so they have used many tactics for protecting the important information these methods includes: local weather disaster biometric access video surveillance foot petrol
Redundant internal networks
Fire detection and suppression

Salesforce helps in providing step by step education to help users for being victim of these threats and malware even it helps in disaster recovery by transferring data to encrypted links, disaster recovery tests and much more even it provides data backup of the customers it also provide secure transmission and sessions like person session is identified with each transaction.
In a nutshell salesforce identify each of the user problems and then help them in solving those security problems by using variety of methods. This will help in organization success and even their own

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this assignment we are asked to identify the major threats and security concepts from a whitepaper located on the internet: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf. This report stated that: “There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec in 2009.” These threats are identified as:…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Classify at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    IS3110 Quiz 6 2015

    • 600 Words
    • 2 Pages

    These are related to malware and Viruses. Users can bring malware from home on Universal Serial Bus (USB) flash disks. They can accidentally download malware from Web sites. They can also install malware from malicious e-mails. The primary protection is to ensure that you install antivirus (AV) software. Additionally, you need to update AV signatures regularly. You can’t depend on the users to keep their signatures up to date. Instead, you must take control of the process. Many AV…

    • 600 Words
    • 2 Pages
    Good Essays
  • Good Essays

    To start off with I chose to go with our banking or financial industry. The banking industry is constantly getting attacked by various methods on a daily basis. I chose this industry because I happen to know someone who works in the security sector at Wells Fargo Bank, he was a good person to get information on what he sees on a daily or weekly basis. This paper is the opinion of myself and with gathered information from various resources.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Describe how an organization can properly manage its information security efforts using proper risk management techniques and cost-benefit analyses for these information security efforts.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett…

    • 299 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Information Security Policy

    • 3396 Words
    • 14 Pages

    The security sections of the paper outline what steps are required to secure each store to ensure the safety of the employees and customers. Detailed…

    • 3396 Words
    • 14 Pages
    Best Essays
  • Better Essays

    Defense against web attacks is a key element in a security professional’s skill set. For this assignment, your manager has asked you to review the Aim Higher College’s Web server and application security and to suggest appropriate defenses. For each of the following scenarios, explain what the threat or threats are, what defenses you would recommend, and why.…

    • 1988 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    C-Tpat

    • 659 Words
    • 3 Pages

    Questionnaire is designed to identify those areas where improvements are necessary to fulfill minimm security requirements. Correct identification of a security weakness will not affect our relation of businesses, but it will allow us to work with our clients to develop a plan of security improvement if necessary.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Many efforts are being undertaken to make e-commerce a safe and reliable means of transaction. These measures have encountered many pitfalls and weak points. Moreover, they are difficult to comprehend and assure the consumer the extent of the security applications. This not only discourages to join e-commerce, but also hampers the further growth of the e-commerce sector.…

    • 10214 Words
    • 41 Pages
    Powerful Essays