Preview

The Myth of Secure Computing

Better Essays
Open Document
Open Document
1133 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Myth of Secure Computing
The Myth of Secure Computing

Case Analysis Report

Digital security….the term is almost a paradox in that there is no such thing as security when it comes to secure computing. At best, threats to digital security can be lessened and sometimes prevented but there is no such thing as an impenetrable defense. Corporations are constantly plagued by computer viruses and hacker attacks are on the rise leaving corporate networks vulnerable. It is estimated that 90% of all businesses every year are affected by security breaches to the tune of some $17 billion. Beyond the enormous costs that can easily wipe out a company’s IT budget, there are far-reaching business repercussions. Day-to-day business operations can be disrupted, customers alienated and a Company’s once good reputation tarnished. With the emerging security threats from a Company’s insiders to the sophisticated cyber terrorist, security breaches are clearly on the rise.

This dilemma obviously requires the expertise of smart IT technicians to take care of the situation. After all, what busy executive has the time to learn such specialized knowledge? Just hire the smartest IT specialists to handle the possibility of an intruder. Herein lays the greatest risk - leaving a company’s digital security to an IT Department or IT manager alone.

At first glance this seems reasonable. IT techs have the formal training and expert skills. Should a breach occur, they are the ones to face the bully. IT Managers ward off and should the need arise, slay the dragon and clean up the mess. So problem solved. To many executives it may appear to be a waste of money to invest in digital security. Beyond being technically complicated, it is also invisible; you know you’ve successfully succeeded in warding off the intruders when nothing happens. So is it any surprise when executives handoff responsibility to hired consultants or in-house technicians to protect the Company’s information assets? It may

You May Also Find These Documents Helpful

  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Liaskos, J., & Sandy, G. A. (2004). An evaluation of Internet use policies of Victorian local…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    In today’s computing world, threats come in many different forms. Business and organizations are bombarded with electronic threats every second. Denial of service (DOS), network disruptions, and stealing of confidential information not only hurt businesses, but also hurt customers. With identity theft so prevalent, a business owes its customers the highest level of security possible. Many mechanisms are available protect critical infrastructure and information.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303–314, Oct. 1998.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    Data breaches and cyber-attacks frequently has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident. (Ponemon Institute, 2013)…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Verizon business researched and reported in 2009 a case study involving data breaches in secured network. Within their findings, they summarize the threats, which industry, and which records are the most popular. The report fist showed that a percentage of the hacking from outside sources came from the European Union, and the most popular info being stolen was financial and retail goods.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    Payton, A. M. (2006). Data security breach: seeking a prescription for adequate remedy. Proceedings of the 3rd annual conference on Information security curriculum development (pp. 162-167). New York: ACM.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    However, that same connectivity opens cyberspace to the greatest risks. As networks increase in size, reach, and function, their growth equally empowers law-abiding citizens and hostile actors. An adversary need only attack the weakest link in a network to gain a foothold and an advantage against the whole. Seemingly localized disruptions can cascade and magnify rapidly, threaten other entities and create systemic risk. However, Vulnerabilities in cyberspace are real, significant and growing rapidly. Critical national infrastructure; intelligence; communications, command and control; commerce and financial transactions: logistics; consequence management; and emergency preparedness are wholly dependent on networked IT systems. Cyber security breaches. Data and intellectual property theft know no limits. They affect everything from personal information to national secrets. This paper looks at the risks in the open cyber world and mind sets of the cyber criminals. Also it presents in ongoing researches in the leading IT nations. Goal of this presentation is to show how basic techniques are useful in securing our local servers. Working of newly made algorithms for private data and securities.…

    • 5897 Words
    • 24 Pages
    Powerful Essays