Preview

Reflection

Satisfactory Essays
Open Document
Open Document
354 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Reflection
Week 1 Summary

We read week one chapters and after first day of class, we learned about Ethical Issues, Threats to Information Security, Protecting Information Resources, creating a process to help eliminate time and cost at the work place.
Ethical issue was discussed regarding the illegal downloading of music and movies through internet sites or apps available on our phones. Since we are attending classes and our education level is rising, what were out thoughts on the illegal downloads? People in class stated that it is easier to purchase songs and movies through ITunes, since it takes seconds to download. There were some people that neither agreed nor disagreed.
Another topic that was discussed in class was Threats to Information Security. One example that was discussed in class was about a call placed to a retail store and information was given by the receptionist and all data was hacked by the caller. At our work places calls regarding information needs to be approved by management before anything can be sent through email or fax. There are security passwords set in place for this same reason.
Next topic that we recall being discussed was Protecting Information Resources when you are in public Wi-Fi places and the web sites we exposed ourselves to. When we use our credit cards at gas stations, we need to check our surroundings to ensure there is no suspicious person trying to hack our credit card accounts. Perhaps we are the lucky ones and this has not happen to us, we know of someone whether friend or co-worker that this has occurred to, and the consequences are unfavorable to the victim. The other topic that we recall being discussed and that we learned about was creating a process. How to make something work more efficiently and follow steps that will eliminate unnecessary steps and become cost efficient. We understand that at every job there are steps or functions that can be

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    This course covers much material about information security in a few short weeks. Whereas the subject is much deeper than what is covered in the course material, you should obtain a useful overview of how important effective information security is, and some ways it can be effectively…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Bat1 Task 1

    • 1280 Words
    • 6 Pages

    IT staff can diminish security breaches by developing effective ways to teach clinical staff about securing their workstations when not in use. Mandatory in-service and power point presentations would be an effective way to do this. The importance of workstation security, not accessing another employee's computer while in use and not using another employee's password should be discussed. Along with how doing so would be in violation of company policy and the HIPAA Privacy Act. Disciplinary action should also be discussed.…

    • 1280 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Security + 280 Exams

    • 2838 Words
    • 12 Pages

    | (TCO 1) What is the most common threat to information security in an organization?…

    • 2838 Words
    • 12 Pages
    Satisfactory Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Public Key Infrastructure

    • 305 Words
    • 2 Pages

    You are the Information Security Officer at a small software company. The organization currently utilizes a Microsoft Server 2008 Active Directory domain administered by a limited number of over-tasked network administrators. The remainder of the organization comprises mostly software developers and a relatively small number of administrative personnel. The organization has decided that it would be in its best interest to use a public key infrastructure (PKI) to provide a framework that fosters confidentiality, integrity, authentication, and no repudiation. Email clients, virtual private network products, Web server components, and domain controllers would utilize digital certificates issued by the certificate authority (CA). Additionally, digital certificates would be used to sign software developed by the company to demonstrate software authenticity to the customer.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    SkillPort Security

    • 647 Words
    • 3 Pages

    Discuss the role that preparing employees to recognize and respond to social engineering techniques should play in the organization’s overall information security program. Note three specific social engineering techniques. Discuss how they can be recognized and how to best prepare employees for each potential attack.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The topic that stood to me the most was point illustration explanation (PIE). PIE makes the reader understand one’s purpose better. When using PIE, the…

    • 1236 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Shiloh Museum Case Study

    • 971 Words
    • 4 Pages

    covering the highlights of the topics discussed and how these can be applied to the benefit of the…

    • 971 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The SIMTRAY

    • 293 Words
    • 1 Page

    The SIMTRAY exercise was a different learning but reinforcing and refreshing some of the topics of this class (such as privacy laws, ethics, anonymity, hackers, and piracy) but also a bit confusing. At first I did not know if the time would permit to complete the whole exercise and I felt under pressure which that’s how the job of the CISOis but I found that to be a distraction and not concentrated to the debth of the issue. So the scenarios at Firion Corporations were used as a process helping to understand the human aspects of cyber security in a simulated work environment where we had to determine the priority and importance of the issue and who to respond or analyze first, which is a real factor or decision on the real world/ work place and not just for the CISO.…

    • 293 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Process of the Crj Process

    • 1113 Words
    • 5 Pages

    The topic that I chose to describe is the criminal justice process. The criminal justice process is described as a process that involves a series of steps beginning with the investigation of the crime and the arrest of the suspect. The next step following the investigation is the pretrial activities, which include the first appearance, a preliminary hearing, information or indictment, and arraignment. Following the pretrial activities, is adjudication, this is where there is a trial by jury. A trial is heard and settled by this judicial procedure. Following adjudication the sentence is given. Lastly, the corrections stage begins.…

    • 1113 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Reflection

    • 1207 Words
    • 5 Pages

    Throughout my placement on Redbrook ward, i have had the opportunity to be involved and take part in MDT meetings. By producing the following table, i was able to understand why having MDT meetings are important, and the importance they have on effective patient care.…

    • 1207 Words
    • 5 Pages
    Good Essays
  • Good Essays

    reflection

    • 1339 Words
    • 6 Pages

    I am a dedicated person to the game of many sports and teaching. I have taught several different sports and also have been well trained in a classroom setting. Working with children of all ages, I have 8 years of coaching football, 4 years of basketball, 12 years of softball with private lessons as well and 3 years’ experience working with special needs students in a classroom. I have a bachelor’s degree in Kinesiology and graduated with honors in that field. I also obtained a teaching credential in Kinesiology but wanted to pursue more in special; education. I believe that education is the way to get somewhere in life, that is why I am continuing my education and getting my Master’s Degree. I like the feeling of teaching and knowing that the students will feel good about them self and have the confidence to approach anything in life due to the positive influence that I have taught them.…

    • 1339 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    mindsets

    • 1161 Words
    • 8 Pages

    computing behavior, information privacy, and computer security. Class time and open lab are used to…

    • 1161 Words
    • 8 Pages
    Powerful Essays