Premium Essay

Inf Security

In:

Submitted By nessus
Words 254
Pages 2
INF 370 – Information Security – Week #4-1 attendance check

1. Read the article “Privacy and Security / Emotion and Security” by Rose McDermott published in Communications of ACM, February 2012:

http://dotlrn.aubg.bg/dotlrn/classes/departmentofcomputerscience/sINF370/INF370S12/file-storage/view/Handouts/Privacy_and_Security_-_Emotion_and_Security-Communications_of_ACM-February2012.pdf

Make a short resume (about 200 words) of the publication.

Responses to presumed threats or attacks are usually emotionally based. People tend to misunderstand or shift their attention to risks that are not very high while forgetting about the not-so-obvious threats. However, these threads are in most cases far more dangerous than the obvious and easy to predict dangers. According to Prospect Theory models individuals tend to weight probability not in the linear fashion advocated by standard normative models of probability theory, but rather the subjective functions that overvalue certain low-probability events. Fear and anger make people anxious and nervous, cause them to make worse decisions and make mistakes.

2. Using AUBG Web find what information security policy, standards, practices and procedures exist. What is the most important for a policy to be effective?

http://www.aubg.bg/RapidASPEditor/MyUploadDocs/Information_Security_Guide.pdf

For a policy to be effective it needs to be observed and applied. No matter how great a policy is if people do not comply with it it’s useless.

3. Any criticism to the existing at AUBG policies, practices and procedures related to information security, computing and communications as a whole?

It takes too long to verify a personal device for use in AUBG

Similar Documents

Premium Essay

Sdasd

...Technovation 34 (2014) 339–341 Contents lists available at ScienceDirect Technovation journal homepage: www.elsevier.com/locate/technovation Editorial The challenge of cyber supply chain security to research and practice – An introduction a b s t r a c t The tremendous potential to assist or degrade economic and national security performance make security in the cyber supply chain a topic of critical importance. This is reflected by the tremendous activity in the public and private sector to better understand the myriad of cyber challenges, identifying existing gaps and needs and closing these gaps as quickly and firmly as possible through government policy initiatives, public/private partnerships, and legal/insurance penalty and incentive regimes. However when we examine the academic literature, the research and publications in this area are rather sparse. Consequently, this special issue on Security in the Cyber Supply Chain is intended to act as a resource to practitioners and as a call to research. & 2014 Published by Elsevier Ltd. Introduction In general, the cyber supply chain provides tremendous advances in efficiency and effectiveness. The economy gains through transactions being more efficient through the low cost rapid transmission of information related to supply chain management. Not only does this rapid transmission reduce cost, but it also provides value through increased effectiveness allowing for services and decisions that were not possible...

Words: 2975 - Pages: 12

Free Essay

Information Security Chap 1-2

...Principles of Information security textbook problems Chapter 1 & 2 … Study this se t o nline at: http://www.cram.co m/cards/136 20 58 What is the dif f erence between a threat and a threat agent? A threat is a constant danger to an asset, whereas a threat agent is the facilitator of an attack. What is the dif f erence between vulnerability and exposure? Vu l n e r a b i l i ty i s a fa u l t wi ti n th e s ys te m , s u ch a s s o ftwa r e p a cka g e fl a ws , u n l o cke d d o o r s o r a n u n p r o te cte d s ys te m p o r t. It l e a ve s th i n g s o p e n to a n a tta ck o r d a m a g e . Exp o s u r e i s a s i n g l e i n s ta n ce wh e n a s ys te m i s o p e n to d a m a g e . Vu l n e r a b i l i ti e s ca n i n tu r n b e th e ca u s e o f e xp o s u r e . Who has the def inition of hack evolved over the last 30 years? In te e a r l y d a ys o f co m p u ti n g , e n th u s i a s ts we r e ca l l e d h a cks o r h a cke r s , b e ca u s e th e y co u l d te a r a p a r t th e i n s tr u cti o n co d e o r e ve n th e co m p tu e r i ts e l f to m a n i p u l a te i ts o u tp u t. Th e te r m h a cke r a t o n e ti m e e xp r e s s e d r e s p e ct fo r a n o th e r s a b i l i ty. In r e ce n t ye a r s th e a s s o ci a ti o n wi th a n i l l i g a l a cti vi ty h a s n e g a ti vl y ti n g e d th e te r m . What type of security was dominant in the early years of computing? Early security was entirely physical security. C o n fi d e n ti a...

Words: 3982 - Pages: 16

Free Essay

A Walk in the It Director’s Shoes

...A Walk in the IT Director’s Shoes Nekole Sissle INF 325 Telecommunications & Networking Concepts Instructor: Karmaveer Koonjbearry May 20, 2016 A Walk in the IT Director’s Shoes When it comes to technology it leads to the internet. Many people can communicate with other people in various places through the internet. Companies can get many advantages by using Internet network to support their business. Therefore, companies are trying as hard as they can, and give high effort in protecting their network from attack and make sure that they have the best network security. Most people think that the threat of security attack is only come from outside the company. In fact, the attack from inside the company network is more harmful with high frequency to be happened. It is widely know now that threats from inside the company is far more dangerous than attacks from outside. These facts shows that any company must plan an implement policies to defend their network security from inside and outside intruders. These companies must find how intruders attack in order to protect their information assets. This will help make their network security more effective in blocking threats either from outside or inside the company. Within my paper I will discuss that I am the Information Technology (IT) Director for a small, growing firm and my tasked would be to develop an electronic resource security policy to deploy within my organization. I will discuss the differences between...

Words: 1183 - Pages: 5

Premium Essay

What Is Your Name in Vietnam

...Information and Cyber-Security Questionnaire 2014: v9.2 2014-2015 STT Information Systems Analysis and Design Business Systems Analysis Systems & Information Systems Copyright © Peter Bednar. 2014 peter.bednar@port.ac.uk STT: Inf. And Cyber-Security Q 2014-15 Page 2/5 Information and Cyber Security Questionnaire All answers in questionnaires are to be kept anonymous. Department (e.g. section): Grade (e.g. category of work): Information and Cyber Security Questionnaire - Part 1 Planning 1. What information assets are critical to your work? 2. What kinds of risks could they be exposed to? 3. What legal and compliance requirements is your work and organization subject to? 4. How could you continue to do your job if your information requirements could not be fulfilled with your IT support? 5. How can you manage risks and threats to your information assets on an ongoing basis? Implementing 6. Have you put in place the right security controls to protect your equipment, information, IT system and external (or outsourced) services? 7. Do you and your co-workers know what your responsibilities related to IS and Cyber Security are? 8. Do you and your co-workers know what good IS and Cyber Security practices are? 9. If there is a IS Security threat or Cyber-attack, or something goes wrong with related to your Information Assets – how will you deal with it and get back to normal practices again? ...

Words: 331 - Pages: 2

Premium Essay

Risk Management and Problem Management of a Compromised Unix Operating System

...relationship between risk management and problem management of a compromised UNIX operating system CSMN 655 Computer Security, Software Assurance, Hardware Assurance, and Security Management Abstract Risk management is an ongoing, continuous process whose purpose is to identify and assess program risks and opportunities with sufficient lead-time to implement timely strategies to ensure program success. The entire risk management process balances the operational and economic costs of protective measures and contributes to mission capability by protecting the systems and the data that support the organizational mission from both deliberate and unintentional compromise. Computer security problem, or incident, management is an administrative function of managing and protecting computer assets, networks and information systems. These systems continue to become more critical to the personal and economic welfare of our society. Organizations must understand their responsibilities to the public good and to the welfare of their members. This responsibility extends to having a management program for reacting to system breaches, if and when they occur. Incident management is a program which defines and implements a process that an organization may adopt to promote its own welfare and the security of the public. Table of Contents Risk Management Overview 4 ...

Words: 4103 - Pages: 17

Free Essay

87th Usar

... 87th USAR Training Support Division Dawn Campbell 1801 Chace Lake Parkway Birmingham, AL 35244 205-873-9440 biaunka1121@yahoo.com GM 591 October 16, 2010 Mr. Michael Carr  The 87th Training Support Division has been around for a very long time. The lineage is traced back (Global Security, 2000) to the 87th Infantry Division which activated and organized at Camp Pike, Arkansas, on 15 August 1917. The Division served as part of the American Expeditionary Force in France during the First World War. The Division entered the combat zone late in the war and primarily conducted Combat Support missions including: construction projects;performing guard duty; military police operations; convoy escort; and many miscellaneous logistics and supply details. The Division was moving to the front lines in November of 1918, the war ended and the Division returned home for deactivation in July 1919. In 1921, the Division reconstituted as part of the Organized Reserves. This unit has participated in three War's starting with World War II. The name of the unit has gone from the 87th Infantry Division to the 87th MAC in 1957 and now the 87th USAR Training Support Division. This lets you know the clout this unit sits on. There have been numerous commanders and many Soldiers to come through those gates, so has there been plenty of people leave. This unit has a mobilized task to handle 9 Brigades and 4 Divisions. The task as written is to process mobilization packets without...

Words: 3913 - Pages: 16

Premium Essay

The Greed Cycle

...Article Review: - The Greed Cycle, by John Cassidy The article by Thomas Cassidy, points out the instrumental role that greed plays in the modern corporation. Modern Economists have always seen greed as not only a necessary element in the corporate environment, but as also a vital part of the successful evolution of a public company. As the article points out, “Economists from Adam Smith to Milton Friedman have seen greed as an inevitable and, in some ways, desirable feature of capitalism. In a well regulated and well balanced economy, greed helps to keep the system expanding”. In the early public companies, greed was not seen as a danger, as the implicit trust that managers would not slack off, and would run the company in the interest of the stockholders and stakeholders was not undermined. Economist was the first to identify the issue of managers not acting in the interest of the shareholders, and instead being motivated by greed, and “self-enrichment”. Public Companies, evolved as a way to create financing for large industry, where in the owners agreed to relinquish day to day control and operation of a company to mangers, who in turn would act in their interest, and maximize revenues. As the article points out, in the beginning, “most of the professional managers were content to collect generous salaries and pensions rather than habitually attempt to rob the stockholders and bondholders. It is a strong proof of the marvelous growth in recent times of a spirit...

Words: 824 - Pages: 4

Premium Essay

Tony

...Implications Three constraints:    Scope for increasing aggregate size of public sector limited Scope for raising debt levels limited Contingent liabilities will need careful management Some implications:  PPP may help but are unlikely to be a panacea (PPP should be driven by VfM not fiscal constraints) Raising savings (revenue), improving efficiency of investment, and equitization will all have to play a role. 4  Debt Management I: Definition of Public Debt Vietnam - Gross Public and Publicly Guaranteed Debt - 2005-2009 2005 2006 2007 2008 2009 (In percent of GDP) A. Gross public and publicly guaranteed debt (B+C) B. Gross domestic public and publicly guaranteed debt (B1+B2) B1. Gross domestic public debt Securities Loans and advances B2. Gross domestic publicly guaranteed debt VDB domestic debt Other entities (Social Policy Bank, VEC, Vinashin bonds etc.) C. Gross external public and publicly guaranteed debt (C1+C2) C1. Gross external public debt Multilateral Bilateral...

Words: 1589 - Pages: 7

Free Essay

Ethics of Compensation

...The issue of ethics in the corporate world has been widely talked about over the last decade. Corporate scandals almost seem like a part of everyday life. The nation’s response is to inform students of ethical conduct and hold organizations to a higher standard. This will hold CEOs and management responsible for all fraudulent acts committed by an organization. The ethical spotlight has now turned to CEO compensation due to the recent decline in the economy. The focus point of those public discussions has been to try and get a better position to influence CEO compensation packages. Determining a CEO compensation package and commitment that does not place undue pressure on the CEO to taint financial statements, provide excessive perks, approve stock option scandals to occur, and let outrageous severance packages could be a giant step in the right direction toward an ethical foundation in the business community. Perhaps CEO compensation packages are not the cause of corporate scandals, but sometimes they do push CEOs into making improper and unethical decisions. The relationship between CEO compensation is parallel to being an ethical company, and having long term success Executive compensation has risen significantly in past ten years. These increases are difficult to comprehend considering profits and stock prices of the only increased by 11% and 23% respectively as of 2008. Although the increase in market value created an environment for increasing compensation without much...

Words: 668 - Pages: 3

Free Essay

Food-Lion Mvp Program

...Food-Lion MVP Program Charles A. Kennedy BUS_120 February 7, 2009 Mr. Belflowers Fayetteville Technical Community College Located throughout different parts of the eastern seaboard, there is a popular food store called Food-Lion. The main goal for the store is to provide quality food products at reasonable affordable prices that other stores cannot compete with. With this as their main goal, the store believes it will greatly gain profit and exposure leading to the company growing. Food-Lion is seeking to expand its operations by improving their quality and providing enough quantity. Food-Lion is seeking to take their business in a whole new direction with a Most Valued Product (MVP) program. The proposed system requirements are the system shall have three tiers of users; customers, users, and managers. Users in the “customers” tier represent customers of Food-Lion and account holders. They will be able to view their MVP savings and instantly get other coupon rewards. Users in the “Users” tier represent employees of Food-Lion. They will be able to view their MVP savings from each customer in their area. This would allow them to track pacific items. Every customer will specifically be assigned one account number that will identify the customer within the Food-Lion MVP Program. Whenever a purchase has been made and the customer uses the MVP Card account number, the savings will automatically be credited to customer purchase. When customers want to use their MVP...

Words: 1205 - Pages: 5

Premium Essay

Steel Majors

...MajoA review of financing instruments by Steel majors: Innovations Tata Steel 2011 In March 2011, Tata Steel became the first company to issue Perpetual bonds (Perps) in India. A Perp has no maturity date. The investor gets income from the bond forever. The company, however, has a Call option after the end of the 10th year. The company can therefore, pay off the bond holders and extinguish the bond. The investor cannot redeem the bond ever, but can trade the bond in the secondary market. The coupon rate for the first 10 years is 11.8 percent, paid semi-annually. From the 11th year the coupon rate will be stepped up to 14.80. The coupon rate will be capped at 14.80%. The promoter stake in the company had been diluted by 2.4% in the FPO of January 2011(described below). This is cited as a reason why the company chose to issue bonds rather than equity. Similarly, taking on more debt would have negatively affected its Debt Equity ratios. The company intends to include the instrument as a separate class of capital under schedule 6 of Indian GAAP. This will not increase the interest burden of the company since the interest as and when paid will be recorded as a change in equity on its balance sheet. It can be counted as debt for tax purposes and as equity for ratings. The cost of capital through this instrument is also lower. Cost of equity for markets such as India is 16-24% and cost of debt is around...

Words: 263 - Pages: 2

Premium Essay

What Make an Army Leader

...1. Clearly define the ethical problem. Ans: The ethical problem is that SGT Day willingness to be dishonest and not report the security breach. 2. Employ applicable laws and regulations. Ans: . I would inform my supervisor of the findings and situation and while adhering to JER and Army regulations for dealing such issues. 3. Reflect on ethical values and their ramifications. Ans: I would counsel SGT Day for just wanting to cover up the findings, reminding him that not reporting the finding of the pages immediately could jeopardize our own career. 4. Consider other applicable moral principles. Ans:  I would to talk SFC Sharp and ask him why the pages weren’t destroyed two week ago and find out how to destroy them at this time. 5. Commit to and implement the best ethical solution. Ans:  I would then come up with a plan so that we can put in place a tracking system so that this situation doesn’t happen again. 6. Assess results and modify plan as required. Ans: Even though the civilian cleaning team doesn’t even clean our area and only our people ever come in here and the pages are from an alternate communications security book and were never used it’s still a Security risk.  After talking with SGT Day and having him check the inventory and destruction certificates and he discovered that SFC Sharp certified the destruction of the book these pages came from two weeks ago and also that there were no more pages. I would to talk SFC Sharp and ask him why the pages weren’t...

Words: 380 - Pages: 2

Premium Essay

Chapter 15 Investments

...E15-3 E15-4 E15-5 E15-6 Content Trading Securities. (Easy) Journal entries. Unrealized holding gain. Balance sheet disclosure. Trading Securities. (Moderate) Journal entries. Income statement and balance sheet disclosures. Long-Term Investments. (Easy) Securities available for sale. Purchase and adjusting entries. Available-for-Sale Securities. (Easy) Journal entries. Compute unrealized increase/decrease balance. Available-for-Sale Securities. (Easy) Journal entries. Balance sheet disclosure. Held-to-Maturity Bond Investment. (Easy) Premium, straight-line amortization, journal entries. Error in recording interest at acquisition. Held-to-Maturity Bond Investment. (Easy) Discount, semiannual interest receipts, straight-line and effective interest methods of amortization, journal entries. Held-to-Maturity Bond Investment. (Moderate) Discount, semiannual interest receipts, sale at gain. Effective interest method. Journal entries. Bond Investment. (Moderate) Discount, semiannual interest receipts, amortization schedule using effective interest method, journal entries. Bond Investment. (Moderate) Premium, semiannual interest receipts, amortization schedule using effective interest method, journal entries. Bond Investment. (Moderate) Premium, semiannual interest receipts, sale at loss. Effective interest method. Journal entries. Transfer Between Categories. (Easy) Reclassification from "held-to-maturity" to "available-for-sale securities." Journal entries for interest and reclassification...

Words: 17388 - Pages: 70

Premium Essay

Crm Notes

...CRM 11- Performance measurement Important stakeholders of a company - Shareholders / Board of directors - Customers - Employees/Management An organisation must maximize the main sources of revenue, profit and growth within the context of both business and customer strategy. The three key stakeholders group are: Employee Value Employee value needs to be considered from two perspectives. #1 the value employees deliver to the organization - This is usually measured against a number of performance objectives, where employees are appraised against performance targets #2 the value the organisation delivers to the employees - Comprises the benefits the work force receives in exchange for the opportunity cost, time and labour expended in performing their job. Customers Value The value the customer receives from the organisation is defined by the perceived benefits of the offer made to the customers, which extend beyond the core product or service. These higher level benefits can come from intangible factors, such as the provision of better customer service or association with a quality brand image. The value of the organisation receives from the customer is determined by the profits obtained from the customer over the lifetime of their relationship with the organisation. Shareholder Value Shareholder value is created by achieving a favourable rate of the return on capital invested. The board of director may expect the following...

Words: 3196 - Pages: 13

Free Essay

Ais Attacks

...contribute or not contribute to the losses. This assignment will use technology and information resources to research issues in accounting information systems. AIS Attacks and Failures: Who to Blame Take a position on whether a firm and its management team should or should not be held liable for losses sustained in a successful attack made on their AIS by outside sources. Include two (2) facts to support your position. Security controls are safety measures to avoid, counteract or minimize security risks. The firm and management team is responsible for effectively implementing preventative, detective, and corrective controls in order to prevent, identify, and limit the extent of damage from occurring, in progress, or caused by the incident. If adequate security controls are in place then the firm and management team should not be held liable for losses sustained in a successful attack made on their Accounting Information System (AIS) by outside sources. However, if a firm and its management team have not implemented an adequate security control system, then they should be held liable for losses sustained in a successful...

Words: 600 - Pages: 3