Preview

WEEK TWO CMGT 400 INDIVIDUAL ASSIGNMENT

Better Essays
Open Document
Open Document
1432 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
WEEK TWO CMGT 400 INDIVIDUAL ASSIGNMENT
Common Information Security Threats involving Ethical and Legal
Sally Lowe
CMGT 400
January 19, 2015
Kell, David
Common Information Security Threats involving Ethical and Legal

Technologic advances occur at a rapid pace, with new devices coming out at frequent intervals. These new devices are appealing to college students who want to do everything as quickly and easily as possible. Because of the numerous smartphones, tablets, and laptops used by students and employees, college campuses face various security issues from mobile devices that connect to the network, often unintentionally.
Identification of Threats
There are many threats a network faces when the IT department allows students to connect to the network or Internet using mobile devices. Some threats affect the campus network only, while other threats directly affect students or employees. For the campus network, threats include
Social media vulnerabilities,
Unauthorized access to employee or student information, and
Email attacks (phishing)
For students, the main threat comes from identity theft, often a result of inappropriate practices connected to social media and email attacks. Often, attacks to a college network occur because of unintentional and misguided errors from students.
Information Vulnerabilities
Students use mobile devices, ranging from smartphones to tablets to laptops, to access class schedules, grades, email, and social network sites. Many devices have the capability to store user ID’s and passwords but personal security measures on these devices are not stringent, making it easy for an unauthorized person to intercept this information. Even though a college computer network may have numerous levels of protection, the system cannot easily track student authentication when mobile devices are used. This lack of authentication provides easy access for even a semi-skilled hacker to the user ID/password combination. Once the hacker has this information, he or she can take over



References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill. Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology. Whitman, M. E., & Mattord, H. J. (2011). Readings and cases in information security: Law and ethics. Boston, MA: Course Technology.

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Better Essays

    User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Olzak, T. & Bunter, B. (2010, May 07). Security basics - components of security policies. Bright…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

     User names and passwords  Patents and copyrights  Source code  Diplomatic information  Financial data NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    9/11 and Airport Security

    • 3569 Words
    • 15 Pages

    McClure, George. "IEEE-USA Today 's Engineer." 02.12 Ieee-usa Today 's Engineer. 2007. Web. 21 Feb. 2012. http://www.todaysengineer.org/2005/Jun/security.asp…

    • 3569 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Bloom Design Group’s

    • 2994 Words
    • 12 Pages

    References: Merkow, M., & Breithaupt, J. (2006). Information security: Principles and practices. Upper Saddle River, NJ: Pearson/Prentice Hall.…

    • 2994 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Mobile devices such as smartphones, PDAs, tablets, and netbooks have become an integral part of everyday business operations. Millions of people log into their company’s secure network on mobile devices via wireless Internet or even accessing their email, making sensitive data more susceptible to data theft and hacking. Mobile technology is advancing at such a fast pace, making it harder for IT managers to keep up with newly emerging threats. Since the smartphone emerged in the business scene, cybercrime has increased exponentially. Data security has now become the main focus for most IT managers in larger corporations.…

    • 1078 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    References: Partners, C. (2014, January 24). Addressing the ongoing problem of IT security. Caldwell Partners. Retrieved February 19, 2014, from http://www.caldwellpartners.com/addressing-the-ongoing-problem-of-it-security/…

    • 649 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The world is surging towards a digital revolution where computer networks mediate every aspect of modern life. Not many years ago, most computers were carefully guarded mainframes, held tightly in the hands of skilled professionals. The systems and their guardians combined to provide ironclad protection of the organization’s all important data. Today the world is scary, anyone can get their hands on to the personal computers and even link into networks.…

    • 2383 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    References: Meiring de, V. s. (n.d). Information security standards and liability. Journal of Internet Law, 13(7), 24.…

    • 1233 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Mobile Devices Security

    • 280 Words
    • 2 Pages

    Mobile devices have been, and continue to be a source of security incidents. These stem from issues such as device loss malware and external breaches. As the availability of human resources and systems continues to be critical to society and business operations, it stands to reason that mobile device usage will continue to escalate as will the features this device offer. It is therefore imperative that proper risk management be applied and security controls implemented, to maximize the benefits while minimizing the risks associated with such devices.…

    • 280 Words
    • 2 Pages
    Satisfactory Essays