Free Essay

Security Report

In:

Submitted By javinaek9
Words 598
Pages 3
Case Study
Jose Rios
SEC-415
Professor Johnson
May 12, 2013

Case Study 1
Cyber attacks are starting to become more popular as companies solely depend on technology to get through their workdays as well to store most of their customers and employees confidential information. Most companies invest money on securing their databases to prevent any type of cyber attack and even though they try to prevent these types of events from occurring hackers are becoming more creative on the way they hack onto companies’ secured network. Hackers go through tremendous amounts of time in order to get to a secured network in order to get the information they are seeking or just to go through private information for their own personal gain. Secured networks are set up throughout organizations to minimize the possibility of a cyber attack from occurring along with other security measures to protect the private information that is being held on those secured networks. Most of the attacks that occur are mainly from people that are disgruntle towards certain companies for their type of work or actions that they have done but others take advantage and commit crimes that affect others. Mark Pollitt, special agent for the FBI, offers a working definition: “Cyberterrorism is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by subnational groups or clandestine agents.”(Denning, Dorothy E.) Other cyber attacks are meant to steal valuable information from high-end organizations in order to jeopardize future projects as well as past projects that some how have affected others. No matter how good and secured a network is there always a chance that it can get hacked by experienced hackers and that’s what IT security should always keep up with technology along with the new methods that hackers are using to get in to secured networks.
There are several different methods from preventing cyber attacks from occurring and every day these procedures are being change in order to keep up with the high amounts innovated ways that hackers are coming up to reach their ultimate goal. All employees should follow the rules and regulations that have been established to keep their network secure even if it means not opening any sort of spam email, going through their social network page, sharing password’s or going to any websites that might seem malicious. Employees should encrypt every email they send especially if that email contains private or important information that certain people shouldn’t get their hands on. Every procedure that is put in place is to protect the best interest of an organization secured network as silly as the procedure might be once an employee slips up that’s when hackers take advantage and infiltrate that network to do the most damage as possible.
Finally no matter how well secured a network might seem there is always room for error and when a secured network is vulnerable at it’s most that’s why employees should always be on the lookout for suspicious emails, websites and Bluetooth devices. IT departments should try their hardest to keep up with the everyday growth of technology to keep cyber hackers from hacking into an organization’s network. Even though most secured networks always run the risk of being hacked by experience cyber experts that oppose some sort of danger to an organization.

Reference:
Denning, Dorothy E. “Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy.” Info War Online. 4 February 2000. Accessed 1 March 2010 from www.iwar.org.uk/cyberterror/resources/dening.htm.

Similar Documents

Premium Essay

Security Report

...Kudler Fine Foods IT Security Report Kudler Fine Foods IT Security Report Kudler Fine Foods is a specialty food store that has three stores located in San Diego, Ca. Kudler Fine Food strives to ensure their customers are happy and stay shopping at their stores. Kudler Fine Foods is starting a frequent shopper program. The new program will require a new system that Kudler will need to design and secure. First potential security threats need to be identified. Throughout the system development, process security will need to be considered. Kudler will need to address concerns if the new system is ever removed. Information security policies will need to be developed to ensure the security of Kudler and their customers. The employees of Kudler will need to go through security awareness training. In addition, audit provisioning by the Kudler staff will need to be addressed. This paper will discuss each of the security issues that Kudler will have to cover. Most Critical Threats Identified With the implementation of the improved customer rewards program many systems will need to be secured and possible threats and vulnerabilities need to be identified. Kudler’s current servers need to be properly secured to ensure they are not hacked or attacked by malicious code. If Kudler’s servers are hacked customers information like addresses, phone numbers, and email addresses could be used by attackers to try to acquire log on information. This is known as phishing, were an attacker...

Words: 3971 - Pages: 16

Free Essay

Veracode State of Software Security Report

...VOLUME 5 State of Software Security Report The Intractable Problem of Insecure Software APRIL 2013 Read Our Predictions for 2013 and Beyond Dear SoSS Report Reader, As some of you may know I have spent most of my 25 year career in the IT Security industry, more specifically, I’ve been focused on application security as the use of web and mobile applications has flourished. For the past five years I have been an active participant in the preparation of the report before you today—our annual State of Software Security Report, or as we fondly refer to it at Veracode, the SoSS Report. Throughout my career I have been evangelizing the need for more secure application development practices, and with the release of each new SoSS report I find myself of two minds. The optimist in me is proud of the vast improvement in general awareness of the importance of securing the application layer. But the pessimist remains very concerned that we are not seeing the dramatic decreases in exploitable coding flaws that I expect to see with each passing year. It’s as if for each customer, development team, or application that has become more secure, there are an equal number or more that do not. While the benefits of web applications are clear to organizations, the risks to their brands, infrastructure, and their data are seemingly not as clear, despite being more apparent than ever. It’s at this point of my letter that I could mention that a cyber-Vesuvius is about to bubble over and create...

Words: 5194 - Pages: 21

Premium Essay

Security Evaluation Report

...Information Security Article Evaluation Nelson Okubasu CMGT/441 12/3/2014 MARJORIE MARQUE Can We Sniff WI-Fi?: Implications of Joffe v. Google Google collected information between 2007 and 2010 both in us and oversees. In 2010 a law suit was filed against google for violating the federal wiretap act. Among the first of the cases to rule on intercepting unsecured Wi-Fi communications. As of today our society has become so dependent on using Wi-Fi communications for various aspects of our lives, there is a parallel expectation of privacy. At the same time there are so many people or users out there who don’t understand how Wi-Fi technology works, if their information is secure, whether there privacy is violated or if the government has the right law in place to protect them. The fact that users do not fully understand Wi-Fi technology and the shortcomings of current security mechanisms is not a justification to violate their privacy, but instead to call on the government to enact or amend the Federal Wiretap Act (FWA) to reflect their reasonable expectations. Clear statutory protections will allow for the continued progression of Wi-Fi technology. Society’s dependency on Wi-Fi networks and public hotspots both economically and personally requires expansion of the FWA to ensure national uniformity. Essentially, the court found that even though Wi-Fi networks do transmit data using radio waves, the uses of Wi-Fi technology...

Words: 1058 - Pages: 5

Premium Essay

Security Incident Report Lab

...Security Incident Report Incident Report #: IR-783 Reported Date and Time: January 12, 2014 Technician: Max Smith Site Location: Sales Department laptop belonging to Howard Telmik. Windows 7 OS. Identification (Type and how detected): Howard in sales called the IT help desk complaining that his system is really slow. He also stated his laptop is behaving weird. Some of his internal reports have been modified and emails from last week have shown up as read. He knows he it wasn't him because he was on vacation last week and left his laptop at home. Virus scan detected BackOrafice and NetBus. Triage (Impact): Fortunately it only affected the user's laptop and did not spread to the company network. Containment (Steps taken): 1) Disabled wireless on the laptop to disconnect it from the company network. 2) Ran a manual virus scan which identified the malware and placed it in quarantine. Investigation (Cause): Howard feels that the Anti-Virus (AV) makes his system slow. So he turned it off. Several weeks ago he received an email from a good and trusted friend that contains some vacation pictures. Shortly thereafter he received an offer to try a new and improved AV software and installed it. Recovery and Repair (Resolution): Used Antivirus software to quarantine and eradicate the malware. Implemented scanning of corporate email for malware and spam. Lessons Learned (Debriefing and Feedback): Antivirus software on systems should be configured to scan all hard drives...

Words: 298 - Pages: 2

Premium Essay

Human Resource Management

...Microsoft Dynamics™ GP Human Resources Sample Reports Copyright Copyright © 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Notwithstanding the foregoing, the licensee of the software with which this document was provided may make a reasonable number of copies of this document solely for internal use. Trademarks Microsoft and Microsoft Dynamics are either registered trademarks or trademarks of Microsoft Corporation or its affiliates in the United States and/or other countries. FairCom and c-tree Plus are trademarks of FairCom Corporation and are registered in the United States and other countries. The names of actual companies and products mentioned herein may be trademarks or registered marks - in the United States and/or other countries - of their respective owners. The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred...

Words: 5235 - Pages: 21

Premium Essay

Manager

... | ABSTRACT This White paper describes the POC Experience of migrating reports from Business Object XI R2 to Cognos BI 8.3 It highlights the challenges, solutions and best practices implemented for seamless transition TARGET AUDIENCE Cognos Architect and Developers of BO to Cognos Migration project PRE REQUISTIC Knowledge of Cognos BI 8.3, Business Objects XI R2 and RDBMS Databases. INTRODUCTION XYZ uses Business Object as a reporting tool to develop and deliver reports to the business to analyze the data. XYZ wants to upgrade these BO reports into Cognos reports using Cognos 8 BI suite. Existing BO Reports presented quite a challenge for migration because of many reasons like diverse formats of reports and multiple interfaces. Cognos BI environment is available with the XYZ. Prime goal to migrate BO reports to Cognos BI. BUSINESS CHALLENGES • Non Standard reporting formats • Installing BO in users machine and maintaining • Reports residing on users machine • Non availability of functional and technical specification • Inadequate Security ACTIVITIES & COMPONENTS 1 Activities • Analysis of existing reports for their functionality and technical aspects. •...

Words: 2384 - Pages: 10

Free Essay

Security Planning for the 2004 Democratic National Convention Case Report

...SECURITY PLANNING FOR THE 2004 DEMOCRATIC NATIONAL CONVENTION CASE REPORT MSFM- Organizational Behavior January 6, 2014 Case Summary In November 2002 the Democratic National Committee selected Boston, Massachusetts to host its July 2004 convention. Boston had beaten out other larger cities which included New York, Miami and Detroit to win the convention. The convention would nominate local politician John Kerry to run against President George W. Bush in the upcoming 2004 election. It was hoped that the event would bring an economic windfall to the city and also showcase the historical and fashionable attractions to the national and international media. Boston Mayor Thomas Menino had worked hard to bring the Democratic National Convention to Boston. The city had tried in 2000 to host the convention but lost out to Los Angeles. On its second try with the help of Senator Edward Kennedy and the state’s congressional delegation Boston was successful. Mayor Menino was very excited for Boston to be in the media spotlight for the four days in July that the convention would be held. It would give the city a chance to bask in the limelight and show its rich historical past and its vibrant present. The Mayor also added that he saw the convention as a challenge for Boston. We’d never had an event of this magnitude. Menino was confident the city would meet the challenge and fare better than others that had hosted political conventions in the past. The city’s elation...

Words: 1741 - Pages: 7

Premium Essay

Data Warehousing

...Web Intelligence • Performing on report analysis with Web Intelligence • Filtering Queries using conditions, prompts etc., • Using Combined Queries and merging dimensions • Displaying data in various formats (Ex: Tables, Charts etc.,) Advanced Reporting: • Calculations, Formulas and variables • Ranking Data, using Alerters to highlight data, Formatting numbers and Dates • Understanding Calculation Contexts • Web Intelligence Functions, Operators and Keywords • Calculating values with Smart Measures Universe Designer: • Designer and Universe Fundamentals • Creating a schema with Tables and Joins • Resolving Join problems in a schema • Defining Classes, Objects, hierarchies, using cascading list of values for hierarchies • Testing the universe • Working with OLAP universes Xcelsius 2008: • Application Overview • Creating and Updating Xcelsius visualizations • Using Xcelsius components ( Chart, Containers, Selectors etc.,) • Exporting Xcelsius visualizations to various applications (Power point, PDF, Flash • Creating templates, Alerts and Dynamic visibility • Using Data Manager ( Creating and configuring connections) • Live Office Connections, Query As A Web Service (QWAAS), XML data Connections Crystal Reports: • Report Design Concepts • Designing Optimized Web Reports • Building queries, Filters and prompts • Sorting, Grouping and Totaling of data • Accessing data sources,Creating and updating OLAP reports Business Objects Enterprise Repository: ...

Words: 462 - Pages: 2

Free Essay

Hp Analysis

...Industry Analysts, Inc. Comparitive Analysis A Comparative Analysis of Hewlett Packard Web Jetadmin 10.0 compared to Web Jetadmin 8.1 Prepared by: Industry Analysts, Inc. July 10, 2007 © 2007 Industry Analysts, Inc. • www.industryanalysts.com Page 2 IATSD Competitive Test Report This Page Intentionally Left Blank © 2007 Industry Analysts, Inc. • www.industryanalysts.com Page 3 IATSD Competitive Test Report A Comparative Analysis of HP Web Jetadmin 10.0 versus Web Jetadmin 8.1 As part of the rollout of the new Web Jetadmin 10.0 Printer/Fleet Management Utility, Hewlett Packard engaged Industry Analysts, Inc., an Independent Testing and Research company, to conduct a detailed comparative analysis. The object of this analysis was to document the benefits of the improvements made in the new Web Jetadmin 10.0 (WJA 10.0) release as compared to the previous Web Jetadmin 8.1 (WJA 8.1) release. The analysis was conducted at Industry Analysts, Inc.’s Technical Services Division in Fairfield New Jersey, and was performed using the latest downloadable version of Web Jetadmin 8.1, which was downloaded from Hewlett Packard’s web site, and the Beta 1 and Beta 2 versions of Web Jetadmin 10.0 supplied to IATSD by Hewlett Packard under nondisclosure prior to it’s official announcement, release, and availability. The protocol consisted of examining both Web Jetadmin releases in specified areas, detailing the differences found between the versions and describing...

Words: 4810 - Pages: 20

Free Essay

Ethical Behavior

...leading to unethical behavior or practices. But the most recent and trustful article is called “Becoming a More Relational Firm in the Post-Sarbans-Oxley Era”. As expressed by the article, the effects of SOX Law has influenced fiscal reports in a lot of ways. The law has required that impartial companies must audit the fiscal reports in which positions of the auditors must be rotated frequently, to ensure that scam cannot be made by the same auditor from year to year, and it’s apply in different sections: * Section 303: This section needs senior management to approve the accuracy and dependability of fiscal reports, meaning that the fiscal reports must be sign for the CEO or CFO of the organization they need to certify that they analize the reports and assure that the reports are accurate. The executives will be held accountable for any mistakes or irregularities by signing authentic records being aware that they will be held responsible for any intend to commit fraud * Section 302: Management needs to submit all material in detail to the SEC( securities & exchange commission) * Section 401: The publisher if the fiscal report is accountable for the accuracy and precision for all of the information held on the fiscal year report. * Furthermore, the SOX law also needs management to organize an internal control statement with each and every fiscal statement. This will make sure that not...

Words: 472 - Pages: 2

Free Essay

Bbhb

...Corporate Social Responsibility, Course 2016 FE1 EDHEC Nice Tutorial 3 BP, Deepwater and Sustainability Reporting The Deepwater Horizon oil rig fire and explosion on April 20, 2010, killed 11 men and caused one of the largest marine oil spills in history. The leak from the undersea well flowed for 87 days and polluted an estimated 68,000 square miles of the Gulf of Mexico waters and nearly 500 miles of coastline from Louisiana to Florida. At the moment of the accident BP was the leaseholder and operator of the Maconda well located off the coast of Louisiana. The company was ultimately responsible for conducting operations there safely and in respect of the environment. BP hired Transocean Ltd (the owner of the drilling rig Deepwater Horizon) to provide the vessel and drilling crew to implement BP’s operations of the Maconda well. 1 Investigations established that bad management on the Deepwater Horizon resulted in poor safety on the rig. The US chemical safety board concludes that a last-ditch safety device on the underwater well had multiple failures and wasn't tested properly. It found that the cause of the initial explosion involved multiple screw-ups with cement, drilling mud, fluid pressure, botched tests, management problems and poor decisions. The blowout preventer sealed the well temporarily, but then it failed and that caused the massive spill. 1 For a description of BP’s implication in the Deepwater Horizon accident you can also read Cherry...

Words: 1059 - Pages: 5

Free Essay

Leg500 Assignment 1

...Whistleblowing and Sarbanes-Oxley Act Student Name College or University Name LEG500 – Law, Ethics, and Corporate Governance Professor’s Title Date Whistleblowing and Sarbanes-Oxley The federal government passed and put into law the Sarbanes-Oxley Act of 2002 (SOX) to primarily protect whistleblowers from retaliation for reporting corporate fraud and financial malfeasance to the government. The negligence became apparent in the 1990’s when corporations such as Enron, HealthSouth, Tyco and WorldCom were found to have grossly overstated their earnings. This cost billions of dollars in losses to shareholders and caused the near-collapse of the stock market (Prentice, 2010, p. 17). The companies were able to hide, scam or misrepresent their earnings due to the dot-com boom, soaring investments, and auditor fraud. The Sarbanes-Oxley Act contains many sections, sub-sections and creation of other agencies to enforce it. It was a sweeping change to standard reporting practices and was created to restore investor confidence, hold corporations and auditors financially and criminally accountable, and protect whistleblowers. Prior to the creation of SOX the whistleblower had no protection from retaliation by the organization. Whistleblowers had fears of criminal prosecution, bodily harm and job loss if they reported the misdeeds of their employer both publicly and privately. The Sarbanes-Oxley Act of 2002 redefined the whistleblower. An examination of the characteristics of a whistleblower...

Words: 1159 - Pages: 5

Premium Essay

Automated Financial Management

...unlimited. UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE lb RESTRICTIVE MARKINGS Ia.REPORT SECURITY CLASSIFICATION Unclassif led 2a. SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION /AVAILABILITY OF REPORT 2b. DECLASSIFICATIONiDOWNGRADING Approved for public release; distribution is SCHEDULE unlimited. 5. MONITORING ORGANIZATION REPORT NUMBER(S) 4. PERFORMING ORGANIZATION REPORT NUMBER(S) 6a. NAME OF PERFORMING ORGANIZATION 6b. OFFICE SYMBOL 7a. NAME OF MONITORING ORGANIZATION (If applicable) I Code 37 Naval Postgraduate School Naval Postgraduate School 7b. ADDRESS (City, State, and ZIP Code) 6c. ADDRESS (City, State, and ZIPCode) Monterey, Ca. Monterey, Ca. 94943-5000 9. PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER A 8b. OFFICE SYMBOL (If applicable) 8a. NAME OF FUNDING/SPONSORING ORGANIZATION 93943-5000 10. SOURCE OF FUNDING NUMBERS 8c. ADDRESS (City, State, and ZIP Code) PROGRAM ELEMENT NO. WORK UNIT ACCESSION NO. TASK NO. PROJECT NO. II. TITLE (Include Security Classification) * Automated Financial Management Information System for Navy Field Activity Comptrollers 12. PERSONAL AUTHOR(S) Tar Taylor, Shaun Kevin ShaunE OFKevineoDa)IS 13b. TIME COVERED TO FROM 16. SUPPLEMENTARY NOTATION The views expressed in Master s Thesis ([fonthDay) ,4 DATE OF 13a. TYPE OF REPORT AE ON ,s PAGE COUNT ...

Words: 17752 - Pages: 72

Free Essay

Case Paper 2

...can see from the case there are several examples of the proposed event where there's less rigorous regulation in the supervision of information systems within the company. Most of the issues described in the case are simple little issues such as emailing customer credit card numbers and such but I would have definitely have seen these issues but the lapse of these company have cost them security wise. The best way for organizations to strike the right balance between monitoring and invading their employees' privacy would be to evaluate each employees based on their activities. Have each employee make a report of their activities while the company is monitoring them as well the companies should put trust in their employees to report everything they're doing and when it is time to evaluate them cross compare what has been monitored and what the employees have reported. The consequence biased to one side would be if the company were to engage in just invading employee privacy there could be massive repercussions such as the company being sued etc. The other components are people security, establishing ethical behavior in the company, and managers taking the initiative to stop any leakage in the company. The human factor in is the stronger point in this situation its not the technology that's leaking information but the people the technology is just a tool to do so. The same goes for when it comes to monitoring and making sure that...

Words: 343 - Pages: 2

Premium Essay

Project Format

...lot in finalizing this project within the limited time frame. SIP Project Report Format 1. Introduction This document describes the standard format for CP3200: Student Internship Programme (SIP) project reports. Students should ensure their reports conform to the required format before submission for examination. 2. Project Report 2.1 Length of the Report The total length of the report, including appendices, should not exceed 20 A4 pages. The main report, without appendices, must not exceed 4,000 words. The text of the main report should be spaced 1.5 lines, in TIMES NEW ROMAN font with size of at least 11. Appendices and other manuals can be in single line spacing and in a smaller font size. Appendices, if any, should be kept small and bound together with the main report. Please consult your project advisor if you are unsure what material you should include in the main report. The report should be clearly written, and should include only relevant information. Note that the inclusion of too much unnecessary detail may cause evaluators to doubt whether the student has really learnt how to distinguish the important issues from the trivial ones. 2.2 Format All CP3200 project reports must be prepared in the following sequence: i. Title page ii. Summary iii. Acknowledgment page iv. Table of contents v. Main report vi. References...

Words: 1875 - Pages: 8