Premium Essay

Ch3 Information Security

In:

Submitted By dcs24
Words 435
Pages 2
Chapter 3

* Federal Trade Commission: “occurring when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes” * Fraud And Related Activity In Connection With Identification Documents, Authentication Features, And Information (Title 18, U.S.C. § 1028Federal Trade Commission: “occurring when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes” * Fraud And Related Activity In Connection With Identification Documents, Authentication Features, And Information (Title 18, U.S.C. § 1028Federal Trade Commission: “occurring when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes” * Fraud And Related Activity In Connection With Identification Documents, Authentication Features, And Information (Title 18, U.S.C. § 1028Federal Trade Commission: “occurring when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes” * Fraud And Related Activity In Connection With Identification Documents, Authentication Features, And Information (Title 18, U.S.C. § 1028Federal Trade Commission: “occurring when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes” * Fraud And Related Activity In Connection With Identification Documents, Authentication Features, And Information (Title 18, U.S.C. § 1028Federal Trade Commission: “occurring when someone uses your personally

Similar Documents

Premium Essay

Noner

...assigned bring your own devices (byod)’s. for all level 1 security users which includes; employees, contractors, vendors, department & managers, the will be a 90 day password expiration which at the end of 90 day forces the user to change their password and cannot recycle their passwords for 9 months. Each password has to be at least 24 characters with one capitol letter and have at least one symbol and one number in the password. For all level 2 workstations which include network administrators we are going to implement CAC CARDS OR COMMON ACCESS CARDS with a pin for main log in. There will be finger print access required to enter any level 2 security workstation or work are. In order to enter any level 2 work area there will be a required key card for entry. On to our level 3 client workstations include; senior administrators, junior administrators, & the co-ceo & the ceo. We plan on implementing a fingerprint scanner to boot the workstation, a 128 bit hard drive encrypted password to log on. In order to enter a level 3 workstation area users will be required to user a CAC magnetized card, a fingerprint, and must be cleared by 24hr surveillance to enter the level 3 workstations area. Server areas- For Richman investments each server room will have 24 hr. surveillance and an onsite guard. Only network administrators, senior administrators, junior administrators and CEO, & CO-CEO’s will have security clearance to enter a server room. In order to enter the...

Words: 751 - Pages: 4

Free Essay

Job Ddescription

...Title | Computer System Operator / 3C0X1 | Department(s) | Communications | Reports to | Shift and Flight Leader as appropriate | Job summary Supervises and performs Communications-Computer Systems (C-CS) operations and executes associated information systems support programs. Performs network management, control, and administration on DoD local, metropolitan, and wide area networks, and Command, Control, Communications, Computer and Intelligence systems, Defense Message Systems (DMS), command and control, and functional area systems. Administers Communications Security (COMSEC) and Information Assurance (IA) programs. Summary of essential job functions Could perform any or all of the following: Perform daily network management, control, and administration of information flow in Network Management (NM), Help Desk (HD), Information Protection Operations (IPO), and Network Administration (NA). Oversee network configuration, faults, performances, and security management through HD, IPO, and NA functions. Review and plan networks, control distribution of Internet Protocol (IP) address space, and enforce Internet use policy. Implement Air Force Computer Emergency Response Team and Automated Systems Security Incident Support Team security fixes, operating system patches, and antivirus software. Develop local restoral and contingency operations plans. Process and review C4 systems requirement documentation, telecommunications service requests, status of acquisition messages, and...

Words: 941 - Pages: 4

Free Essay

Security Tips

...Running head: SECURITY TIPS Security Tips Sunday, January 30, 2010 Security Tips Employees must share the responsibilities with their employer when it comes to keeping their computers and data safe. Employers can predict lots of issues and put barriers in place, but with new viruses and new hackers being produced every day there is no way that the security on your employer’s servers and firewalls can catch everything. There are several things that employees can look out for everyday to help prevent their individual computer being attacked and their data being made vulnerable. Internet, e-mail, passwords and sharing data probably rank as the top 4 ways employees allow their information to become exposed. Let us begin by exploring how you can help keep your data safe, while still getting your job done if you require internet access. Basic advice of internet security 101 would be to not download anything that you do not know the source. Pop ups for advertisements are a main source for opening websites or downloading information that has a virus. When viewing websites or downloading information from various websites, look for the SSL symbol. SSL stands for Secure Sockets Layer and the symbol is a little pad lock in the bottom right hand corner of your internet browser. “SSL is the transaction security protocol used by websites to protect online communications. The most common use of SSL is to provide protection for confidential data, such as personal details...

Words: 784 - Pages: 4

Premium Essay

Network Security

...FLORIDA INSTITUTE OF TECHNOLOGY CYBER SECURITY WITHOUT CYBER WAR U.S. Military vs. International Law Perspective A SHORT PAPER ASSIGNMENT TWO SUBMITTED TO: IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR CYB 5275: ENTERPRISE INFORMATION SECURITY BY CRAIG CANNON MELBOURNE, FLORIDA JANUARY 25TH 2013 In her article “Cyber Security without Cyber War”, Mary Ellen O’Connell does a brilliant job in giving the reader an overall view of the debate concerning which government should have primary responsibility of the internet when it comes to the legal authority of cyberspace. She begins the article by citing two major players in this debate: the U.S. Military with its rules and legislation vs. NATO and its international law. According to O’Connell, the USA feels that the military should have primary responsibility over the internet since it has the largest number of technical experts and legal authorities with respect to cyberspace than anyone else in the world. Many in the international community would disagree with allowing the US military to police the internet. They raise the question: What legal rules would be used to guide the military in its supervision of the internet. They believe that using international law is the best way to govern cyberspace usage. (Johnson, 1996) Still others favor the US military’s Cold War strategy of deterrence as a way of patrolling the internet. These that favor...

Words: 1872 - Pages: 8

Premium Essay

Security Pllus Exam Essentials

...aspects of information security. Ensuring a secure network involves good design, implementation, and maintenance. The information in your organization is potentially vulnerable to both internal and external threats. Identify these threats and create methods of countering them before they happen. Be able to identify the potential physical, operational, and management policy decisions that affect your information security efforts. It isn’t good enough to have a plan if the plan is unsound or has gaping holes. You must make sure that the plans you develop and the procedures you follow to ensure security make sense for the organization and are effective in addressing the organization’s needs. Be able to explain the relative advantages of the technologies available to you for authentication. You have many tools available to establish authentication processes. Some of these tools start with a password and user ID. Others involve physical devices or the physical characteristics of the person who is requesting authentication. This area is referred to as I&A. Be able to explain the relative capabilities of the technologies available to you for network security. In most situations, you can create virtual LANs, create connections that are encrypted, and isolate high-risk assets from low-risk assets. You can do so using tunneling, DMZs, and network segmenting. Be able to identify and describe the goals of information security. The three primary goals of information security are prevention...

Words: 5056 - Pages: 21

Premium Essay

Boss

...Bus. 101 1/2/13 Cyber Security Cyber security is defined as actions taken to safeguard information technology or computer systems against unapproved access or attack. Cyber security has become really important for businesses and modern society today. We are living in a world where information technology and other types of communication systems have a great impact on us because they infiltrate every aspect of our lives. This builds a protection of our intangible assets and actions within cyberspace which are of great importance, whether for sustaining a prosperous business, individual life and society. We are becoming more and more dependent upon information technology and the dangers we face are organized and growing. There are numerous threats that involve the cyber world. Among these are the hackers infiltrating into people’s systems and damaging files, viruses that are eliminating the system, individuals using others devices to harm others, someone pocketing your valuable credit card information to make their own purchase. Attacks from hackers and terrorist have prompted the focus on cyber security. Whenever we mention cyber security, we are focused on the prevention, revealing and reaction to attacks and threats having to do with information in your computers. As mentioned by Prof. Moss, IT security threats are more and more focused on the robbery of valuable data. Frequently, there are malicious codes or malware that pass through our security systems when we access...

Words: 1036 - Pages: 5

Premium Essay

Tft2 Task 1

...Updated Heart Healthy Information Security Policy Due to personnel, policy and system changes, and audits, Heart Healthy has voluntarily updated their information security policy to be in-line with the current information security laws and regulations. Currently Heart-Healthy Insurance, a large insurance company, plans to review and provide recommendations for an updated information security policy in the area ‘s of: Current New Users Policy The current new user section of the policy states:  “New users are assigned access based on the content of an access request. The submitter must sign the request and indicate which systems the new user will need access to and what level of access will be needed. A manager’s approval is required to grant administrator access.”(Heart-Healthy Insurance Information Security Policy) Current Password Requirements The current password requirements section of the policy states: “Passwords must be at least eight characters long and contain a combination of upper- and lowercase letters. Shared passwords are not permitted on any system that contains patient information. When resetting a password, users cannot reuse any of the previous six passwords that were used. Users entering an incorrect password more than three times will be locked out for at least 15 minutes before the password can be reset.”(Heart-Healthy Insurance Information Security Policy) Heart Healthy Insurance Information Security Policy and Update  Proposed User Access...

Words: 1532 - Pages: 7

Premium Essay

Information Security

...Information security means protecting information and information systems from unauthorized access, use, disclosure, modification or destruction. Since the early days of writing, heads of state and military commanders understood that it was necessary to provide some mechanism to protect the confidentiality of written correspondence and to have some means of detecting tampering. For over twenty years, information security has held confidentiality, integrity and availability as the core principles of information security. Confidentiality is the term used to prevent the disclosure of information to unauthorized individuals or systems. Confidentiality is necessary (but not sufficient) for maintaining the privacy of the people whose personal information a system holds. In information security, integrity means that data cannot be modified without authorization. When Management chooses to mitigate a risk, they will do so by implementing one or more of three different types of controls. Administrative controls form the framework for running the business and managing people. Logical controls (also called technical controls) use software and data to monitor and control access to information and computing systems. Physical controls monitor and control the environment of the work place and computing facilities. Information security uses cryptography to transform usable information into a form that renders it unusable by anyone other than an authorized user; this process is called encryption ...

Words: 4064 - Pages: 17

Premium Essay

Social Engineering

...Theories of Security Management Strayer University Prof. (Dr.) Gideon Nwatu May, 5, 2013 Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs “Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures”. (Rouse, 2006) Social engineering is a con game in where a person breaks into a computer network in the efforts to gain the confidence of an authorized user and to get them to reveal information that will compromise their network security. Social engineering relies on the weakest link, which are human beings. Most social engineering attacks happen when attackers send urgent emails or correspondence to an unsuspecting authorized user of an urgent problem that requires immediate network access. According to (Rouse, 2006) these types of social engineering tactics appeal to vanity, a since of authority, or greed. Attackers rely on the fact that people are not aware of the value of the information they possess and are careless about protecting it. Security experts believe people are more dependent on information than ever and social engineering will remain the greatest threat to any security system. They also believe that educating people about the value of information, training them...

Words: 2232 - Pages: 9

Premium Essay

Project Logistics

...INFORMATION SECURITY POLICY Pearce & Pearce, Inc. maintains electronic and hardcopy information assets which are essential to performing services for our clients. Similar to any other capital resources owned by the company, these resources are to be viewed as valuable assets over which the company has both rights and obligations to manage, protect, secure, and control. Pearce & Pearce, Inc. employees, contractors, and other affiliates are expected to utilize these information assets for only legitimate business purposes while assuring the Confidentiality, Integrity and Availability of the assets. The Board and management of Pearce & Pearce, Inc., located at 1945 W. Palmetto St., Suite 105, Florence, SC 29501, which operates in special risk insurance and student insurance, are committed to preserving the confidentiality, integrity and availability of all the physical and electronic information assets throughout the organization in order to preserve its competitive edge, cash-flow, profitability, legal, regulatory and contractual compliance and commercial image. Information and information security requirements will continue to be aligned with Pearce & Pearce, Inc. goals and the ISMS is intended to be an enabling mechanism for information sharing, for electronic operations, for e-commerce and for reducing information-related risks to acceptable levels. The Pearce & Pearce, Inc. current strategic business plan and risk management framework provide the context for identifying, assessing...

Words: 1265 - Pages: 6

Premium Essay

Layered Security in Plant Control Environments

...Layered Security in Plant Control Environments Ken Miller Senior Consultant Ensuren Corporation KEYWORDS Plant Controls, Layered Security, Access Control, Computing Environment, Examination, Detection, Prevention, Encryption, Compartmentalization ABSTRACT Process control vendors are migrating their plant control technologies to more open network and operating environments such as Unix, Linux, Windows, Ethernet, and the Internet Protocol. Migrating plant controls to open network and operating environments exposes all layers of the computing environment to unauthorized access. Layered security can be used to enhance the level of security for any computing environment. Layered security incorporates multiple security technologies in each computing layer to provide resistance to unauthorized intrusion, while reducing the risk of failure from a single technology. Layered security requires acceptance of a model, development of an access control plan, compartmentalization of the network, and implementation of core security products that address examination, detection, prevention, and encryption. Layered security is considered a “best practice” in any computing environment, and should be widely used in critical control environments. INTRODUCTION Plant control environments have traditionally been built on proprietary technology. This proprietary technology provided a reasonable level of security from unauthorized access due to its “closed” nature, and lack of connection...

Words: 2711 - Pages: 11

Premium Essay

Administrative Controls

...” First, the definition of “due care” is the care that a reasonable man would exercise under the circumstances; the standard for determining legal duty. In the case of an information system, due care is a legal yardstick used to examine whether an organization took reasonable precautions to protect the Confidence, Integrity, and Availability (CIA) of an information system in a court of law. Organizations use Administrative Controls whereas management creates policies, standards and guidelines as well as a training and enforcement programs to ensure that the policies, standards and guidelines are being followed in order to protect the CIA of information within their information system. A lack of administrative controls suggests that management is negligent in understanding its responsibility to protect the information system usually contributing to theft, loss, or aid of a crime. How does the absence of Administrative Controls impact corporate liability? I feel that the absence of Administrative Controls would have a negative impact on corporate liability. If an organization handles Personal Identity Information (PII), whether personal, financial, or medical, they are legally responsible for the safe keeping of this information. Not having administrative controls in place to safeguard this information, an organization could be held liable should theft, loss or aid of a crime occur. Legislative actions such as the Gramm-Leach-Blailey (GLB), the Health Insurance Portability...

Words: 591 - Pages: 3

Premium Essay

Computer Science

...services have been turned off or disabled | Correct Answer: |    Both A and B | | | | |  Question 3 0.5 out of 0.5 points | | | Social engineering is a fancy phrase for lying. It involves tricking someone into sharing confidential information or gaining access to sensitive systems. In many cases, the attacker never comes face to face with the victim. Instead, the attacker might phone an employee and pose as a (n) ________________________. All too often, attackers trick employees into sharing sensitive information. After all, employees think, what’s wrong with giving your password to a(n) ________________?Answer | | | | | Selected Answer: |    system administrator | Correct Answer: |    system administrator | | | | |  Question 4 0 out of 0.5 points | | | Which of the following is not a type of monitoring device?Answer | | | | | Selected Answer: |    IPS | Correct Answer: |    Server log | | | | |  Question 5 0.5 out of 0.5 points | | | What is meant by clipping levels?Answer | | | | | Selected Answer: |    Values used in security monitoring that tell controls to ignore activity that falls below a stated value. | Correct Answer: |    Values used in security monitoring that tell controls to ignore activity that falls below a stated value. | | | | |  Question 6 0 out of 0.5 points | | | Monitoring, auditing, improving and securing are steps to take for what?Answer | | | | |...

Words: 12833 - Pages: 52

Premium Essay

The Challenges in Implementing Iso 27001

...talk about security standards. On this term paper we are going to first identify what is IOS 27001 from different point of view, second we will explain the challenges in implementing ISO 27001 by evaluating the framework of ISO, discussing the benefit and advantages of ISO 27001 and why it's used in UAE. After that we will clarify the challenges of ISO 27001 after interviewing two companies and get rich information from their experience in this filed then compare the challenges in and out UAE based on (3-4) articles. What is ISO/IEC 27001 1- ISO/IEC 27001 is a Controls-based policy o A comprehensive set of controls comprising best practices in information security and It's an Information standard that encompasses all types of information. o “Whatever form the information may take, or means by which it is shared or stored, it should always be appropriately protected” (ISO17799:2000) (FIRSTSOURCE,Undated) 2- ISO/IEC 27001:2005 : o Provides strategic and tactical direction o Recognizes that Information Security is a Management issue o Non-technical (BUREAU VERITAS) 3- ISO 27001(earlier BS 7799) is an International standard which provides a model (PDCA Model) for setting up and managing an effective ISMS. o ISMS is that part of the overall management system, based on a business risk approach, to establish, implement, operate, monitor, review, maintain and improve information security. o It provides 11 Security Control Clauses under 39 Key Security Categories...

Words: 2150 - Pages: 9

Premium Essay

Map Hindustan

...Essentials of MIS, 10e (Laudon/Laudon) Chapter 7 Securing Information Systems 1) Smartphones have the same security flaws as other Internet-connected devices. Answer: TRUE Diff: 2 Page Ref: 224 AACSB: Use of IT CASE: Comprehension 2) Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up. Answer: TRUE Diff: 2 Page Ref: 224 AACSB: Use of IT CASE: Comprehension 3) Viruses can be spread through e-mail. Answer: TRUE Diff: 1 Page Ref: 224 AACSB: Reflective Thinking CASE: Comprehension 4) The term cracker is used to identify a hacker whose specialty is breaking open security systems. Answer: FALSE Diff: 2 Page Ref: 228 AACSB: Use of IT CASE: Comprehension 5) To secure mobile devices, a company will need to implement special mobile device management software. Answer: TRUE Diff: 3 Page Ref: 248 AACSB: Use of IT CASE: Comprehension 6) Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan. Answer: TRUE Diff: 2 Page Ref: 225 AACSB: Use of IT CASE: Comprehension 7) Computer worms spread much more rapidly than computer viruses. Answer: TRUE Diff: 2 Page Ref: 226 AACSB: Reflective Thinking CASE: Comprehension 8) One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender. Answer: TRUE Diff: 2 Page...

Words: 5826 - Pages: 24