Preview

Itm 431 Module 1 How to Achieve Business Information Security in Cyberspace

Better Essays
Open Document
Open Document
1348 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Itm 431 Module 1 How to Achieve Business Information Security in Cyberspace
In the 21st century, a business without a network mirrors a city with no roads. Small businesses, in particular, arguably have a greater need for network connections and information systems. Small businesses rely on information systems for several things, to include their communication and customer database.
Small businesses rely on network connectivity for communications. With the advancement in Voice Over Internet Protocol (VOIP), many businesses are using the internet to save on phone costs. Additionally, it is common for a business to have an in-house communications system. Take some installations in the Air Force for example; they use an Instant Messaging (IM) service for member-member contact. Many times, it is easier to reach someone through IM or social networking. However, these commodities present their own challenges about IT security. However, that is not all that needs protection. In fact, in a more broad view, communication is viewed as a small bite.
When a business sells its product/s online, it is at distinct advantage over mom and pop stores because they have to collect certain data to complete the transaction; shipping, credit card, billing, and personally identifiable information (PII). (Bradley, 2010) This system is located on a network accessible to employees in order to conduct business. Companies are not only morally obligated to protect customers’ information; it’s the law. The May 2002 Financial Information Safeguards Rule requires businesses to develop a written information security plan that describes, among other things, the specific ways their employees should protect consumer information. The plan must be appropriate to the business's size and complexity, the nature and scope of its activities, and the sensitivity of the information its employees encounter, and must be regularly monitored. (Federal Trade Commission, 2002) The company must consider all areas of its operation, including three that are particularly important to



References: Bradley, H. (2010, April 21). Customer Databases as Marketing Tools. Retrieved November 20, 2012, from Small Business Computing: http://www.smallbusinesscomputing.com/emarketing/article.php/3877761/Customer-Databases-as-Marketing-Tools.htm Federal Trade Commission. (2002, October 17). FTC Offers Guidance on How to Protect Customer Information. Retrieved November 20, 2012, from Federal Trade Commission: http://www.ftc.gov/opa/2002/10/safeguard.shtm Indiana University. (2012, August 21). Knowledge Base. Retrieved November 20, 2012, from University Information Technology Services: http://kb.iu.edu/data/aoru.html Kessler, G. C. (1996, January). Passwords - Strengths and Weaknesses. Retrieved November 20, 2012, from garykessler.net: http://www.garykessler.net/library/password.html Natarajan, R. (2008, June 8). The Ultimate Guide For Creating Strong Passwords. Retrieved November 20, 2012, from The Geek Stuff: http://www.thegeekstuff.com/2008/06/the-ultimate-guide-for-creating-strong-passwords/ Schulman, A. (2012). Top 10 Database Attacks. Retrieved November 20, 2012, from The Chartered Institute for IT: http://www.bcs.org/content/ConWebDoc/8852

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In the user domain, the weak link is the user. Simple passwords can be a major problem so you must use complex passwords with eight or more characters, upper and lower case, and special characters. Passwords will be changed monthly and the same password cannot be used within a twelve month period.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the user domain, one of the easiest ways for the system to be compromised is through the users. Simplicity of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    a. To maximize confidentiality and to make passwords harder to crack, passwords should be of a minimum length (8 characters or more), complex (upper/lower case, numbers, and special characters), have a minimum password age (change periodically), and password history must be enforced (cannot use the last 10 passwords).…

    • 518 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking Exposed 6: Network Security Secrets & Solutions. New York, NY: McGraw-Hill.…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    It 244 Final

    • 2332 Words
    • 10 Pages

    Customers trust this organization with highly private personal and financial information. That makes it our responsibly to handle that information with the utmost respect and care. Through the controls and procedures outlined in this policy we can achieve those goals.…

    • 2332 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    When planning password policy’s stress extra protection, in some cases, a good password is enough protection to keep out intruders. In others, it’s just a start. Encryption and one-time passwords add extra protection to systems. Encryption means garbling the password to protect from sniffers or other onlookers, through a particular scheme that can be deciphered from the other end of the connection. Users should exercise extreme caution when writing down or storing passwords. Stories of hackers obtaining passwords through shoulder-surfing and dumpster diving are not urban myths, they are real. Here a good practice for a company to…

    • 428 Words
    • 2 Pages
    Good Essays
  • Good Essays

    References: Clifford, M. (2004). Identifying and Exploring Security Essentials. Upper Saddle River, NJ: Pearson Prentice-Hall…

    • 705 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Boyz N the Hood

    • 577 Words
    • 3 Pages

    Boyz in the Hood" is a film that protray’s social problems in South Central Los Angeles. Tre, Ricky, and Doughboy are the main characters in this film that grow up together in their neighborhood or as they called it "the hood". All three characters struggle with different internal issues which helps them grow as young men. Tre is a good student who has dreams of furthering his education by going to college. With guidance from his father, Tre learns responsibilty and character. Ricky is an outstanding athlete who is trying to earn a football scholarship to USC. He feels that sports is his only outlet to greatness. Ricky's brother Doughboy is an all around gangster that associates himself with violence, alcohol, and crime. Doughboy , which means drug dealer, on the contrary maintains a strong sense of pride. Basically, Boyz in the Hood tells the story about life in South Central Los Angeles with the struggle of young black men as they turn to education, give into violence and drugs and hope high for college. Boyz N the Hood is a better movie because the effects of positive role models are seen through the portrayal of violence, crime, and family values.…

    • 577 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    In the article, “The psychology of password management: a tradeoff between security and convenience”, the author…

    • 380 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Power, Richard, 1999 CSI/FBI Computer Crime and Security Survey, Computer Security Journal, Volume XV, Number 2, 1999, pp. 32.…

    • 2543 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    References: Schwartz, M. J. (2012, January 17). From cyber espionage to Android malware, expect to see a greater variety and quantity of attacks than ever before. Retrieved from http://www.informationweek.com/security/vulnerabilities/10-security-trends-to-watch-in-2012/232400392…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    tttttttttttttttt

    • 900 Words
    • 3 Pages

    Using information technology, businesses have the ability to view changes in the global markets far faster than they usually do. With so many transactions done online and so much information available online, it’s important to keep all of that safe. Information technology makes it possible for your online data to stay secure until accessed by the proper channels.…

    • 900 Words
    • 3 Pages
    Powerful Essays