Preview

Preventing Security Breaches

Good Essays
Open Document
Open Document
555 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Preventing Security Breaches
Preventing Security Breaches
Ka 'Sandra Johnson
BIS/221
December 8, 2014
Jamie Telesca
Preventing Security Breaches
When an organization uses and relies on computer systems and information technology to assist in running their company(s) and also uses these resources to store important, personal information about clients, customers, employees, and the organization itself, it is important to have the adequate security protection in place to prevent this information from being compromised. The following summary will discuss how IBM prevents security breaches by using technology to reduce the rampant crime committed against them. IBM’s Security Measures
The International Business Machines (IBM) is an American multinational technology and consulting corporation that manufactures and markets computer hardware and software, and offers infrastructure, hosting and constructing services in areas ranging from mainframe computers to nanotechnology. The total revenue for 2013 was 99.751 billion dollars, and employed 431,212 (2013, Reuters), which is why it is important for them to have security covering every aspect of their company. In addition to their already proven security services portfolio, IBM is now including new enhanced intelligence tools and services that provide deeper, real-time analysis of advanced threats. These services can help organizations make rapid decisions to prevent security breaches from impacting the business, by detecting outlying behavior and threading together diverse contextual data.
There are sources such as the Cloud, mobile computing applications, and social media that has critical information that can affect company’s security profile, so according to the vice president of IBM’s Security Services Marisa Viveros, “The company is using analytics to anticipate threats as they appear instead of after the fact”. Listed below is a chart of the IBM analytics tools and services.
New Suspicious Host



References: ProQuest.com. (Dec 1, 2011) Security Portfolio/Analytics Tools Prevent Breaches. Retrieved from http://search.proquest.com.ezproxy.apollolibrary.com/docview/906639289?pq- origsite=summon Reuters.com. (2012-2013) IBM Company Overview. Retrieved from http://www.reuters.com/finance/stocks/companyprofile?/symbol=ibm

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 4104 Words
    • 17 Pages

    However, there is growing interest in protocols and other mechanisms for use with novel telecommunications services. Next-generation value-added services are bound to introduce new vulnerabilities. The interaction between all these communications and security protocols, and the mechanisms used for distributed systems security, is fertile ground for both interesting research. Ways to enhance these protection tools to make sure our technology is safe from IT attacks are evolving all the time. The systems or measures used to protect a company system at present might not be of any use in the future as technology is always enhancing to higher levels. Telecommunication businesses tend to be comparatively adept at managing information security risks. And many are taking action to achieve an enhanced level of ongoing insight and intelligence into ecosystem vulnerabilities and dynamic threats. Companies like Celcom must be ready to invest in this expensive research so as to be able to aggressively compete in the intense telecommunication market and to be able to sustain itself in this industry. Today, information security is a discipline that demands advanced technologies and processes, a skill set based on counterintelligence techniques, and the unwavering support of top executives. As telecom operators become more similar to technology companies, they will face a raft of new challenges. Core practices like employee awareness and training, policies and tools to reduce insider risks, and protection of data, including intellectual property, will need to be updated. The confluence of mobility, cloud, and social networking have multiplied risks, yet few operators have addressed these threats or deployed technologies that monitor user and network activity to provide insight into ecosystem vulnerabilities and threats. These…

    • 4104 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    Unit 4

    • 1878 Words
    • 8 Pages

    Organizations invest a large portion of their information technology budgets on security applications and services, such as antivirus software, firewalls, and encryption. But no matter how much security hardware or software you deploy, how tightly you control the rights of users, or carefully you configure security permissions on your data, you should not consider the job complete unless you have a well-defined, timely auditing strategy to track the effectiveness of your defenses and identify attempts to circumvent them.…

    • 1878 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    During Week 2, our team focused our collaborative discussion on different technologies that businesses can use to prevent security breaches and reduce the risk of cyber-attacks they are increasingly experiencing. To aid in our discussion, team member, Jennifer Ashton, posted an article entitled “The Right Technology Fix Can Help Prevent Breaches”, written by author, Tim Horton. Mr. Horton’s article remarked on the rising number of data breaches, how often they affect small businesses, and measures that organizations can employ to avoid future intrusions.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Swot Analisis

    • 433 Words
    • 2 Pages

    This business strategy really takes into practice all the core values of the company. It responds to the results from observing what is happening with clients, and the subsequent implementation of new technologies tailored to their specific needs in order to get "client's success”.…

    • 433 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Security Awareness Policy

    • 1733 Words
    • 3 Pages

    with IS security policies by signing a compliance agreement that is retained in their personnel…

    • 1733 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The use of information technology in business presents major security challenges, poses serious ethical question, and affects society in significant ways. Especially, the computer crime is a growing threat to society and is caused by the criminal or irresponsible actions of individuals who are taking advantage of the widespread use and vulnerability of computers and the Internet and other networks. It presents a major challenge to the integrity, safety, and survival of most business systems.…

    • 1690 Words
    • 7 Pages
    Better Essays
  • Best Essays

    Ibm Business Strategies

    • 1652 Words
    • 7 Pages

    IBM is one of the largest globally integrated enterprise in the world and since 2000, the company has spent over $70 Billion on research and development to implement innovation to technology that supports Big Data, cloud, mobile and social computing. The company boasts the world’s largest cloud for analytics and allows over 200,000 employees access to perform analytics on multitude of business functions (sales forecasting, skills evaluation etc.) while significantly improving upon project delivery time. The company has seen a sharp change in direction in the previous decade from hardware production to Services and Software units now taking the driving seat for revenue generation. Services and Software are now responsible for 41% and 44% of profit respectively (2015 IBM Road Map, 2012)…

    • 1652 Words
    • 7 Pages
    Best Essays
  • Powerful Essays

    Ibm Strategic Plan

    • 8468 Words
    • 34 Pages

    At IBM, we strive to lead in the invention, development and manufacture of the industry's most advanced information technologies, including computer systems, software, storage systems and microelectronics. We translate these advanced technologies into value for our customers through our professional solutions, services and consulting businesses worldwide. Create experiences that combine the magic of software with the power of Internet services across a world of devices We recognize and seize opportunities for growth that builds upon our strengths and competencies N/A…

    • 8468 Words
    • 34 Pages
    Powerful Essays
  • Good Essays

    Information system has been playing a grave essential role in daily business activities. Over the past decade, the detection rate of computer crimes concerning information system attacks has risen sharply. According to Kunz and Wilson (2004), reported computer crimes have been septupled from 2000 to 2003 and leads to inestimable economic loss. Therefore, themes on information security, especially the prevention of computer fraud, have attracted increasingly attentions (Romney and Steinbart, 2009). However, it seems that perpetrators can always find new techniques to theft invaluable business secrets stored, processed or protected by those information systems. Moreover, some abuse techniques have been used in economic espionage, which causes a yearly loss of $250 billion (ibid). Oracle Corp vs. SAP AG could be one of the relating cases occurred in the recent 2007 and is not yet closed till present. This essay will firstly introduce the Case. Then by using Fraud Triangle, analyze the reason of SAP’s commitment of computer fraud and data theft. Finally, suggestions on how to improve the security of company’s information system will be addressed with some reflections of the Case.…

    • 2645 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

    In this topic we will be discussing six computer crimes and how they are committed. We will also look at laws that protect users against these specific crimes. At the end, we will look at ways in which users and corporations can protect themselves against computer crimes physically, using software, electronically and what controls management can implement to safeguard company IS infrastructure. At the end, we will explain ways in which individuals as well as company management can safeguard against computer crime.…

    • 5098 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    As we all know, security is broad. Firms with the latest technology handle numerous tasks at the same time. This ranges from surveillance, coordination between employees and monitoring clients’ premises, among others. Additionally, latest technology ensures work is efficiently handled when compared to human…

    • 725 Words
    • 3 Pages
    Satisfactory Essays