Preview

Notes

Good Essays
Open Document
Open Document
1370 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Notes
acket-X is a leading manufacturer of industrial grade gloves and jackets. The company is located in a large city where it produces jackets which are mainly used by professionals dealing with safety related applications. The company also deals with the manufacturer and development of new designs for gloves. The company’s HR department had been experiencing issues with payroll even though the company never used any form of fraud.
The company decided to put in place a mechanism dealing with vulnerability assessment, as well as a strategy to check the company’s network system to assess any form of vulnerabilities which could allow any external unauthorized access to the facility. In the past, the company had experienced a case of malware infection which nearly interfered with network system, almost bringing it down. This called for an urgent need to check the IT check up in preparation for an external audit. Therefore, the need for cyber security capability within organizations has been highlighted recently with the increases in cases of hacking which have been consistent within the organization before realizing that it was under attack. According to Wilshusen, 2010, cyber attack is likely to have far reaching consequences to any organization as making efforts to build and maintain trust and repair potential reputation with the customers and stakeholders.
Cyber Threats and Vulnerabilities
Cyber threats and vulnerabilities are associated with the organization’s IT system (Campbell, 2012). There are different types of threats that the company may experience. For example, in the employee individual timestamp entry, the following may be observed. Bogus employees may get added to the payroll master file. On the other hand, false timecards can be created. Issues may also arise where the payroll specialists can alter payroll details in the validation phase. Furthermore, when assigning groups of employees to supervisors, payroll administrators may create falsified checks.

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Verizon business researched and reported in 2009 a case study involving data breaches in secured network. Within their findings, they summarize the threats, which industry, and which records are the most popular. The report fist showed that a percentage of the hacking from outside sources came from the European Union, and the most popular info being stolen was financial and retail goods.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It/205 Dq 1

    • 369 Words
    • 2 Pages

    Ensuring proper level of security is important for a business because it is crucial to the operations. The business must protect the valuable asset, confidential information pertaining to trade secrets, financial data, product development, business strategy, and customer’s information. Inadequate security could result in legal liability and demise of business. Strong security and control can result in an increase of employee productivity and lower operational costs. Some tools available to prevent breaches are firewalls, intrusion detection, and antivirus software.…

    • 369 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Notes

    • 2294 Words
    • 10 Pages

    In 2006, the NSW Government passed the Crimes Legislation Amendment (Gangs) Act 2006, making it the first Australian jurisdiction to legislate specific offences against criminal organisations (Schloenhardt 2008). The provisions make it an offence to participate in a criminal group, defined as three or more people who have as their objectives either to obtain material benefits from serious indictable offences or to commit serious violent offences. The Act also created power for the court to make a fortification removal order, in order to deal with OMCGs' heavily fortified premises.…

    • 2294 Words
    • 10 Pages
    Better Essays
  • Satisfactory Essays

    Notes

    • 466 Words
    • 2 Pages

    ·Himalayan Mountains- Mountain range in south Asia that contains Mt. Everest ( worlds tallest peak).…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Notes

    • 1570 Words
    • 7 Pages

    Celia was the name of a young female slave, who came to work for a prominent Missouri family called the Newsoms. Robert Newsom, a plantation owner in Callaway, Missouri, purchased her at age 14. Newsom was recently widowed and it seems he purchased Celia, looking for sex. He started raping her after being brought back to the farm. From then on, Newsom "visited" Celia often in a cabin he provided for her which was very close to the main household. Over the years, Celia had two children with Newsom, which he also considered "his property". The interesting thing about Celia’s story is that it recounts a tale of social strife and clearly indicates the fact that slaves were playing with a heavily stacked deck in relation to their Caucasian opposites.…

    • 1570 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Notes

    • 298 Words
    • 2 Pages

    This list is not exhaustive; any additional research gathered needs to be included to enhance your answer.…

    • 298 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Notes

    • 295 Words
    • 2 Pages

    How do clinical psychologists help their patients with mental illness?: They help them solve their problems by changing harmful or ineffective behaviors.…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Virtually every business today uses at least one form of computer information technology. Business firms use computers to automate and assist in managing everything from operations, sales, finance, and logistics. Internal databases and intranets are used for internal controls and organizations are connected via the internet to conduct sales, marketing and many other communications and transactions. Electronic business, or e-business, is dominating modern markets and the business world. This new world of technological innovation has exponentially increased efficiency and globalized the world’s economies. Unfortunately criminals still exist and continue to exploit businesses, committing acts of theft, vandalism, and terror. E-business is not immune to criminal mischief and in fact can be quite vulnerable to sophisticated cyber criminals known as hackers. In early 2008 it was reported that the North East Supermarket mogul, Hannaford Bros. Company fell victim to a computer hacking attack that compromised approximately 4.2 million customer credit cards. This act created a financial nightmare for thousands of consumers and for the Hannaford Bros. grocery company. The incident was a black mark on Hannaford’s public image and a financial burden to their corporation. Cyber Security is a growing priority of today’s business leadership. Boon, Kurtz (2011)…

    • 1647 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Notes

    • 1389 Words
    • 6 Pages

    a) Aristotle wrote that a tragedy must have unity of plot. What does this statement mean?…

    • 1389 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Notes

    • 270 Words
    • 2 Pages

    Question: Evaluate the relative importance of the following as factors prompting Americans to rebel in 1776: *parliamentary taxation *British military measures *restrictions of civil liberties *the legacy of colonial religious and political ideas.…

    • 270 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    notes

    • 1387 Words
    • 6 Pages

    A. List at least three things that are wrong with or problems with each of these theories:…

    • 1387 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Risk Control Matrix

    • 607 Words
    • 3 Pages

    • Ensure that antivirus and antimalware controls are installed on all systems and updated daily.…

    • 607 Words
    • 3 Pages
    Good Essays