Premium Essay

The Importance Of Computer Security

Submitted By
Words 1729
Pages 7
Executive Summary

Computers and networks are involved in virtually all activities today. They are used to communicate, to create intellectual property, to store data, to perform business transactions and much more. Networks afford users the opportunity to continuously use computers through wireless connectivity across many different platforms. Any computer connected to a network can be used for many purposes. Just because a computer is located in the workplace does not mean that the computer is used only for work. The pervasive nature of computers and networks means that they are increasingly connected to incidents and crimes, which can be accidental and/or malicious (Mandia et al, 2003).

Fig 1. (Schneiderman, 2014) http://www.net-security.org/secworld.php?id=17119 …show more content…
Suspected incidents may be detected in countless ways. Computer security incidents are normally identified when someone suspects that an unauthorised, unacceptable, or unusual event has occurred involving the computer networks or data base system. Initially, the incident may be reported by an end user, a system administrator, an IDS or Firewall alert, or discovered by many other means. Pre-incident preparation gives YONS an overall view of corporate risks as well as public reputation. Ensuring the security and privacy of data assets is a crucial and very difficult problem in our modern networked world. There is an increase in concern over Database Security, evidenced by an increase in the number of reported incidents of loss of or unauthorised exposure to sensitive data, not only here at YONS, but across the world. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. Unfortunately no organisation can ever be 100% safe from a security breach. However, I am happy to report that according to the Online Trust Alliance (OTA) in 2013; more than 97% could have been prevented by implementing simple steps and following best practices and internal controls (Imperva 2013).It is in my opinion that if we at YONS Ltd. remain vigilant by briefing all members of staff across the company, as well as incorporating a dedicated CSIRT team to know how to respond once an incident is spotted. Such a cross industry incident response strategy could maximise our effectiveness with any such security issue once it

Similar Documents

Premium Essay

Intro to It Security

...IMPORTANCE OF INFORMATION TECHNOLOGY SECURITY Importance of IT Security Table of Contents Introduction .................................................................................................................................................. 2 e-commerce Trends ...................................................................................................................................... 2 Risks .............................................................................................................................................................. 4 Cost of Cybercrime........................................................................................................................................ 6 Prevention Steps ........................................................................................................................................... 7 Conclusion ................................................................................................................................................... 10 References .................................................................................................................................................. 11 1 Importance of IT Security Introduction For the business professional information technology (IT) security is of upmost importance. The reliance that companies have on information systems in conducting everyday business transactions has facilitated the need...

Words: 1863 - Pages: 8

Premium Essay

Cmgt-400 Security Policy Importance

...Maintaining Information Security CMGT-400 Assurance and Security 5-25-2013 Maintaining Information Security Maintaining the security of information couldn’t have been said any clearer than by Lindsey Walker of InfoSec Island, when in 2010 she wrote an article about sensitive information becoming breached. She said “Preventing information security breaches needs to become a main priority for any company when handling both customer and company information”. Sharing information has become much easier than in previous years, from the widespread mainstream use of USB thumb drives or the constant urge to share some secret news or research on Twitter and other social media. The need for a company to constantly review and update their information security policy periodically has never been greater than now. Security Policy An Information security policy should be written in a way that defines how digital information should be protected and accessed by all company employees. Most information that is used to define the Information Security Policy can be gathered by first running a risk analysis report. These reports look at your business model and create a data structure that can be used to inform a company about where their greatest risks are within the company and around the entire work place. Certain “must-have” check boxes for items that should be included in an information security policy are Acceptable Use Policy, Wireless Policy, Email Policy, and Encryption Policy. These...

Words: 1928 - Pages: 8

Premium Essay

Essay On Home Computer Security

...Even though news stories are full of computer security concerns, home computer users do not have a clear image about computer security. Home computers are target for hackers because of their vulnerabilities. Hackers change home computers into what is know a Zombie army which facilities them to attack other computers on the network by using smart software. Moreover, Home computers are subject to other threats like identity theft. Therefore, this report focuses on the importance of Home Computer Security by shedding light on threats to them with tangible solution to these threats. introduction Home computer is the preferable target of hackers according to Symantec (computer Security Company) that 86 precent \cite{Hacker} of all attacks aim home computers. Home computers are targeted due to the user’s lack of basic information about how to secure their computers. Another...

Words: 1093 - Pages: 5

Premium Essay

Cyber Security

...| Cyber Security | | Patrice Brockington | 4/20/2013 | | Cyber Security The security of online files, applications, documents, consumer information, and organization information are just some of the valued items that need to be secure from cyber threats. Companies and organization that utilize the internet to conduct business know all too well the importance of securing the information and any and all information of those that they do business with. Having some general knowledge of what cyber security is and the importance of it is our purpose in this brief. Cyber security is the “measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack”, as defined by Merriam-Webster.com (Online, 2013). In general practice cyber security is simply securing online information and service systems. If you ever entered your name, address or any personal information online or into some database to win a prize this information is online or somehow accessible via the Internet. It is this type of information that so many millions of people are concerned about if it is secure or not, since it is out on the Internet. “The nation’s critical infrastructure relies heavily on the Internet for everything from submitting taxes, to applying for student loans, to following traffic signals, to even powering our homes” (Government, 2013). This is why cyber security is one of this country’s most important national security priorities...

Words: 645 - Pages: 3

Premium Essay

Boss

...Bus. 101 1/2/13 Cyber Security Cyber security is defined as actions taken to safeguard information technology or computer systems against unapproved access or attack. Cyber security has become really important for businesses and modern society today. We are living in a world where information technology and other types of communication systems have a great impact on us because they infiltrate every aspect of our lives. This builds a protection of our intangible assets and actions within cyberspace which are of great importance, whether for sustaining a prosperous business, individual life and society. We are becoming more and more dependent upon information technology and the dangers we face are organized and growing. There are numerous threats that involve the cyber world. Among these are the hackers infiltrating into people’s systems and damaging files, viruses that are eliminating the system, individuals using others devices to harm others, someone pocketing your valuable credit card information to make their own purchase. Attacks from hackers and terrorist have prompted the focus on cyber security. Whenever we mention cyber security, we are focused on the prevention, revealing and reaction to attacks and threats having to do with information in your computers. As mentioned by Prof. Moss, IT security threats are more and more focused on the robbery of valuable data. Frequently, there are malicious codes or malware that pass through our security systems when we access...

Words: 1036 - Pages: 5

Free Essay

Importance of Cyber Security

...The Importance for Cyber Security BCOM/275 Cyber security is an essential element to any business and our Government. Unfortunately many corporations do not realize the importance of computer security until it is too late and have experienced a cyber-attack. The consequences of such an attack can be quite severe, as businesses carry an obligation to everyone involved to protect their identity and personal information. Today we are more reliant on computers and to the networks related to them more than ever, because of this reliance, security has become priority number one. Cyber security is an essential factor to be measured in order to defend ourselves and livelihood from hackers and dangerous software designed by people with ill intent. The majority of these dangers to computer networks come from the internet and these are frequently intended to have terrorist like effect on networks and most importantly, people’s lives. Recent attacks have been very high profile, including the Sony hack which is still being investigated. Cyber security is, therefore, by definition an attempt by an individual or entity to protect their personal information and data from cyber-attack. Cyber security involves multiple steps, the most significant of these being an individual’s understanding of the diversity of these cyber-attacks. Once one has knowledge of this, then it is the individual’s responsibility to make sure they have reliable and up to date software...

Words: 511 - Pages: 3

Premium Essay

Introduction to Computer Security

...Introduction to Computer Security CSE 3482 Introduction to Information/Computer Security Instructor: N. Vlajic, Winter 2014 Learning Objectives Upon completion of this material, you should be able to: • Describe the key security requirements of confidentiality, integrity and availability (CIA). • Describe the CNSS security model (McCumber Cube). • Identify today’s most common threats and attacks against information. • Distinguish between different main categories of malware. Required Reading Computer Security, Stallings: Chapter 1 Computer Security, Stallings: Chapter 6 Introduction • Information Technology – technology involving development & use of computer systems & networks for the purpose of processing & distribution of data  in many organizations, information/data is seen as the most valuable asset categories of IT jobs:  IT administrator - installs, maintains, repairs IT equipment  IT architect - draws up plans for IT systems and how they will be implemented  IT engineer - develops new or upgrades existing IT equipment (software or hardware)  IT manager - oversees other IT employees, has authority to buy technology and plan budgets  Introduction (cont.) • Information System – entire set of data, software, hardware, networks, people, procedures and policies that deal with processing & distribution of information in an organization  each component has its own strengths, weaknesses, and its own security requirements information...

Words: 1194 - Pages: 5

Premium Essay

Computer Networking

...demands and challenges of the time. Program: BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Program Objectives: The BS Information technology program includes the study of the utilization of both hardware and software technologies involving planning, installing, customizing, operating, managing and administering, and maintaining information technology infrastructure that provides computing solutions to address the needs of an organization. The program prepares graduates to address various users’ needs involving the selection, development, application, integration and management of computing technologies within an organization Course Title: Free Elective II (Information Assurance and Security) Course Description: This course provides a broad view of information assurance and security and its major subjects: protection of information assets; access to information system; hacking legislation and industrial standards. In addition this course will serve as a guideline for students to make their course selections. Course/Year and Section: BSIT...

Words: 1777 - Pages: 8

Free Essay

Secring Windows and Unix/Linux Servers

... Companies must pay close attention to secure their computer networks from would be intruders. In order to maintain the highest level of security within the os servers you must first have knowledge of the vulnerabilities of the running operating system. It is those vulnerabilities in the system that the intruders will be searching your network for. The known shortcomings and vulnerabilities of Windows and Unix/Linux servers have dysfunctions that can be exploited to gain access to a company’s private information. This information in the wrong hands could cost an organization millions of dollars in security damages. One of the ways to prevent this type security breech is to make sure that your Windows and Unix/Linux servers has the right up dated patches for these operating systems. According to, (Conklin, W. A.2009) “One of the most effective measures security professionals can take to address attacks on their computer systems and networks is to ensure that all software is up-to-date in terms of vendor-released patches. Many of the outbreaks of viruses and worms would have been much less severe if everybody had applied security updates and patches when they were released.” Ignoring the update prompts on your system is not a wise thing to do. New vulnerabilities in operating systems are discovered every day. According to, Goodrich, R. (n.d) “Software patches serve a very important role beyond annoying computer users. Their intended purpose is to quickly push out...

Words: 471 - Pages: 2

Premium Essay

Importance of Firewall

...Importance of Firewall MedIQ is going in the right direction by adding a firewall in their network. The importance of a firewall is that it blocks malware that would be able to scan your computer to find its vulnerable areas and then attempt to break it while it is at its weakest point. First of all there is only one way to make your computer completely safe from attack and that is either when it is off or unconnected from the Internet. Other than that there are always vulnerabilities. However, you can make it as close to hacker proof as possible while it is connected to the Internet. The way to do this is to have a personal firewall installed along with antivirus and anti spyware protection. Plus you have to make sure that all three of these are updated on the regular. Additional protection is available to a network that used a router with a firewall feature. Firewalls protect your computer from outside attacks by guarding it from unnecessary Internet traffic. They can however be configured to block certain data while letting other data in. The importance of a firewall on your computer can not be underestimated especially for those who are always connected to the Internet. Firewalls are positioned between your computer and your network and are great for protecting multiple computers but also offer a great degree of protection for single computer use. It allows individual users decide how much content they want to filter through and what websites are safe to use. In some...

Words: 1017 - Pages: 5

Premium Essay

A Paper

...Hardware and Software: The Means to Security and Communication Hardware and Software: The Means to Security and Communication When people think of military, they often tend to think of superior power and advance technology. Nothing could be farther from the truth. In reality most military computers are generations behind the technology curve. When the military chooses hardware, it typically looks for several unique characteristics. What to Look for According to EHow.com there are three main things to look for when planning on buying a computer. The Random Access Memory (RAM) allows move programs to run at a time. Hard Drive space allows the user to save information to the computer to be accessed later. Finally the other thing EHow.com recommends is to get a reliable brand name so you won't have to troubleshoot in the future ( EHow.com, 2011). When the military prepares to buy computers, it does in bulk. Not only does the military buy many computers, but they search for different characteristics. Out of the three common things that average consumers look for, only one really matters when it comes to military computers. Random Access Memory (RAM) is not as important on most military computers because each computer is not designed to handle that much graphics or to many programs at once. Military Hardware There a many specialized computers designed for weapon systems that are specifically designed to meet the demands of their specific weapon...

Words: 737 - Pages: 3

Free Essay

Db Responses

...people who have access to technology and those who lack access to technology. Clearly, computer technology has brought about significant ethical and social effects among people from all dimensions. The significance of the digital divide can be witnessed at school and work. The evidence of a digital divide can be seen in terms of the differences in access to computer technology. Different obstacles that limit the access to computer technology for some individuals have caused the divide. Access to computer technology is limited by the differences in geographical areas. From the geographical perspective, statistics indicate that individuals living in suburban areas have a higher access to computer technology both online and computer access as compared to rural and central city residents (Kizza, 2002). Income levels also determine the access to computer technology since computer gadgets or devices are monetized thus individuals have to purchase them and this poses a challenge to people who experience financial constraints. Other -issues include ethnicity where statistics indicate that white non-Hispanic individuals have a higher access to computer technology as compared to other individuals. Age and education also determine the access to computer technology. I agree with Kizza (2002), The digital divide has significantly affected the virtual workplace since only employees with access to computer technology. The disadvantage of the digital divide is that organizations may fail in...

Words: 1942 - Pages: 8

Premium Essay

Idjgvjhgfjhgj

...been major security threat for web based application. It allows attacker to use multiple computers situated far away from each other to attack on single victim computer. It not only affects the services given by the application but makes it hard to stop the DOS attack. Our project concept is to implement a practical IP traceback system that will track the DOS packets to its original source. To achieve this we use Flexible Deterministic Packet Marking (FDPM). FDPM provides a defense system with the ability to find out the real sources of attacking packets that traverse through the network. While a number of other traceback schemes exist, FDPM provides innovative features to trace the source of IP packets and can obtain better tracing capability than others. We are going to simulate FDPM system in NS2 which is network simulation software and study its various advantages and disadvantages as well as its application. 2.) Virtual Router Introduction Computers are the integral part of our life. One can not think of his/her life without the help of computers. Computer network has been playing important role in bringing the world closer due to its functionalities. Routers are the heart of computer network. Virtual Router is an attempt to automate all the functionalities of the physical router on the computer. Various institutes, offices can use virtual router to carry out the routing functions. 1.1 Objective of Project:- Computer networks...

Words: 1214 - Pages: 5

Premium Essay

Internal Control and Risk Evaluation

...controls and risk into the flowcharts. Team A will design internal controls to ease risks to the systems, and discuss other controls, outside the system, that Kudler Fine Foods may need When evaluating Kudlers accounting information systems and the integration of the automation we found that Kudlers focus should be on payroll, accounts payable, accounts receivable, and inventory processes. Theses processes have risk involved. This brief will focus on Kudlers internal and external controls, which include polices and procedures, HR compliance/code of conduct and computer information access. Kudler must maintain a policy and procedures system documenting in detail how each procedure should be completed. The code of conduct will show employees the importance of the controls put in place to maintain the philosophies of the organization. Who has access to each system and or server is important to the security of Kudler; if security is broken down the customers will lose confidence in Kudler. Policies and procedures It is important for Kudler to maintain policies...

Words: 828 - Pages: 4

Premium Essay

A Case Study on How to Manage the Theft of Information

...A Case Study on How to Manage the Theft of Information Robert M Polstra III Kennesaw State University 2004 Westwood Rd Smyrna, GA 30080 404-641-8937 rpolstra@hotmail.com ABSTRACT 1. INTRODUCTION This paper shows the importance that management plays in the protection of information and in the planning to handle a security breach when a theft of information happens. Recent thefts of information that have hit major companies have caused concern. These thefts were caused by companies’ inability to determine risks associated with the protection of their data and these companies lack of planning to properly manage a security breach when it occurs. It is becoming necessary, if not mandatory, for organizations to perform ongoing risk analysis to protect their systems. Organizations need to realize that the theft of information is a management issue as well as a technology one, and that these recent security breaches were mainly caused by business decisions by management and not a lack of technology. After counter-terrorism and counter-intelligence, cyber crime is the third highest priority for the U.S. Federal Bureau [4]. With the rise of the theft of information and the lure of big profits for this stolen information, it is necessary for information systems to have the ability to protect this valuable asset. It is estimated that a credit card number unsupported by any other documentation is worth $10, and a credit history report retails for $60 [2]...

Words: 3469 - Pages: 14