Premium Essay

The Importance of Network Security to Safeguard Organizational Proprietary Data

In:

Submitted By dship82
Words 2112
Pages 9
Running head: Network Security

The Importance of Network Security to Safeguard Organizational Proprietary Data
Donald Shipman
Strayer University
Dr. Kwang Lee
June 10, 2012

Abstract
Cyber-criminal activity is on the rise in a world that thrives on the use of technology in everyday living. The close-minded thought process of simple theft of a credit card number or a social security number are long gone. Crimes in today’s business are much more extreme to include attacks that disable key functions of major operations such as public transportation and utilities, to the major financial records of customer information being exposed and stolen. In this paper I will focus on the latter. It is important that companies make significant investment in network security in order to protect its proprietary data from hackers and other criminals. I will address current attitudes toward network security, the rise in and recent increase in criminal activity, existing counteractive measures along with their effectiveness and the direction of network security for organizations in the future. Ultimately, the paper will show the importance of network security in organizations and the immediate change is needed to restore the consumer confidence about their information being safe.

Introduction
The Internet has become a staple of the business world today. One might find it impossible to be current on the latest world events without being able to effectively use it, navigate it, and understand it. The internet is the world’s single greatest primary source of connected networks, computers and user connections. (Scacchi, 2004) The Internet has grown at a rate that greatly exceeds any prior trend or advancement in relation to modern information technology. There is no real person or entity that can claim ownership of it, but the users are able to gain from the ability to access

Similar Documents

Premium Essay

Fay Servicing Case Study

...formal Information Security Risk Management Program has been established as a component of the Organization's overall risk management policy and is an integral part of Fay’s Information Security Program to ensure that Fay is operating with an acceptable level of risk. The Information Security Risk Management Program is described in this Policy. 2. Overview Risk Management is the continuous process which allows Fay’s business owners to balance the operational and economic costs of protective measures while achieving gains in mission capability,...

Words: 1501 - Pages: 7

Premium Essay

Acceptable Internet Use Policies

...Necessity of an Acceptable Internet Use Policy for Business William E. Boyle Point Park University Abstract This paper will argue that an Acceptable Internet Use Policy, combined with effective network monitoring and policy enforcement is an essential requirement for businesses to protect business assets and resources. It discusses the potential loss to business from employee misuse of internet access and the danger from external sources. Necessity of an Acceptable Internet Use Policy for Business The internet is an integral part of today’s business resources. Organizations, large and small use the internet to improve organizational efficiencies. Businesses use the internet for everything from worldwide sales using websites, workforce collaboration using email and network data access, and for business research. In most business organizations, all types of devices, from desktop computers to cell phones and PDA’s, allow workers to access the internet and send and receive email on demand. A 2008 study by the Pew Internet & American Life Project found that 53% of Americans are employed, and 96% of these workers have some access to these tools. (Madden, M. & Jones, S., 2008). This allows workers instant access to websites, email and instant messages, but uncontrolled access exposes a business organization to a great risk of financial loss. All businesses must manage this risk through the implementation of an Internet Use Policy combined with employee education...

Words: 2537 - Pages: 11

Premium Essay

It Director Final Paper

...tasked to develop an electronic resource security policy to deploy within the organization. The policy will be designed to protect the organization’s valuable electronic assets, but also be flexible enough to accommodate the employees as they execute in their jobs and get business done. Communications and data security aspects such as smartphone access, remote data access, and internal electronic email such as email and IM messaging. The paper will discuss the difference between policy and implementation, and describe the importance of their separation. An outline of the security policy will be drafted stating the areas identified. The paper will compare the differences between users who work remotely or use wireless hotspots to users who work on site in a traditional office environment. Finally, it would discuss how I would implement the security policy within the organization which includes how employees would be apprised of the new policies, and an explanation of which elements are critical for a successful implementation of the policy. The difference between implementation and policy is that implementation is the execution, carrying out, method, standard, and policy for doing something. In Information Technology, it ensures that all the processes within the system is operating correctly in its environment. This may include installation, configuration, user training, delivery and troubleshooting necessary changes. The policy or IT security policy is a set of standards and guidelines...

Words: 1530 - Pages: 7

Premium Essay

Security

...Department of Commerce An Introduction to Computer Security: The NIST Handbook Special Publication 800-12 User Issues Assurance Contingency Planning I&A Training Personnel Access Controls Audit Planning Risk Management Crypto Physical Security Policy Support & Operations Program Management Threats Table of Contents I. INTRODUCTION AND OVERVIEW Chapter 1 INTRODUCTION 1.1 1.2 1.3 1.4 1.5 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made Explicit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Systems Owners Have Security Responsibilities Outside Their Own Organizations...

Words: 93588 - Pages: 375

Premium Essay

Security

...Michigan Technological University Information Security Plan The Information Security Plan establishes and states the policies governing Michigan Tech’s IT standards and practices. These policies define the University’s objectives for managing operations and controlling activities. These top-level policies represent the plans or protocols for achieving and maintaining internal control over information systems as well as compliance with the requirements imposed on the University. INFORMATION SECURITY PLAN Approval by Information Security Board of Review Members Information Security Plan Rev: 3 – 10/13/2011 Page 1 Information Security Plan Table of Contents 1 2 3 4 5 6 7 8 EXECUTIVE SUMMARY ................................................................................................................. 4 PURPOSE............................................................................................................................................. 4 SCOPE .................................................................................................................................................. 5 DEFINITIONS ..................................................................................................................................... 5 IT GOVERNANCE COMMITMENTS & RESPONSIBILITIES .................................................. 6 UNIVERSITY POLICY STATEMENT .........................................................................................

Words: 10423 - Pages: 42

Premium Essay

The Handbook

...Technology Technology Administration U.S. Department of Commerce An Introduction to Computer Security: The NIST Handbook Special Publication 800-12 User Issues Assurance Contingency Planning I&A Training Personnel Access Controls Audit Planning Risk Management Crypto Physical Security Policy Support & Operations Program Management Threats Table of Contents I. INTRODUCTION AND OVERVIEW Chapter 1 INTRODUCTION 1.1 1.2 1.3 1.4 1.5 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made Explicit. . . . . . . . . . . . . . . ....

Words: 93564 - Pages: 375

Premium Essay

Comp Aud

...6. Managing the security of information 6.1 Control over data integrity, privacy and security 6.1.1 Information Classification: is the conscious decision to assign a level of sensitivity to data as it is being created, amended, enhanced, stored, or transmitted. The classification of the data should then determine the extent to which the data needs to be controlled / secured and is also indicative of its value in terms of Business Assets. The classification of data and documents is essential if you are to differentiate between that which is a little (if any) value, and that which is highly sensitive and confidential. When data is stored, whether received, created or amended, it should always be classified into an appropriate sensitivity level. For many organizations, a simple 5 scale grade will be sufficient as follows: Document / Data Classification | Description | Top Secret | Highly sensitive internal documents e.g. pending mergers or acquisitions; investment strategies; plans or designs; that could seriously damage the organization if such information were lost or made public. Information classified as Top Secret has very restricted distribution and must be protected at all times. Security at this level is the highest possible. | Highly Confidential | Information that, if made public or even shared around the organization, could seriously impede the organization’s operations and is considered critical to its ongoing operations. Information would include...

Words: 6802 - Pages: 28

Premium Essay

Statistics

...I. Plug In Multiple Choice 1. What is a customer facing process? A) A standardized set of activities that accomplish a specific task, such as processing a customer's order B) Result in a product or service that is received by an organization's external customer C) Invisible to the external customer but essential to the effective management of the business and include goal setting, day-to-day planning, performance feedback, rewards, and resource allocation D) Attempts to understand and measure the current process, and make performance improvements accordingly. 2. Which of the following is not one of the important characteristics of business processes? A) The processes have internal users B) The processes have external users C) The processes occur only within organizations D) The processes occur across organizations 3. What attempts to understand and measure the current process, and make performance improvements accordingly? A) Customer facing process B) Business process reengineering C) Continuous process improvement D) Business process management 4. Which of the following represent the managerial approach to reengineering projects? A) Define the scope, plan, evaluate, analyze, approve, execute B) Define the scope, evaluate, analyze, plan, approve, execute C) Define the scope, analyze, evaluate, plan approve, execute D) Varies depending on the project 5. What is equipment used to capture information and commands...

Words: 4544 - Pages: 19

Premium Essay

Comprehensive Aap

...World-Wide Trading Company’s corporate headquarters will remain in Hong Kong, while The New York office will be used as an international extension. This office will house approximately 200 staff members. The newly hired IT team will provide the New York office with a state of the art network design. The initiative will focus on the reinforcement of reported security vulnerabilities at other WWTC locations. This design will exceed all other previous standards and set the mold for other businesses to emulate. Project Goal The goal of this project is to increase WWTC revenue from 10 billion to 40 billion dollars by the within the next three to four years. The focus lies within reducing operating costs from 30 to 15 percent by using an automated system for the buying and selling of goods, or, e-commerce. With the implementation of a new, highly scalable, fast and efficient Local/Wide Area Network (LAN/WAN), WWTC will be able to achieve its goals by providing both management and staff with reliable global communications. The network must also be secure in order to maintain good business relationships with consumers and investors alike. Sensitive information traversing the WWTC network (identities, company data) will be protected using state of the art networking tools/equipment and will only be used in an...

Words: 7472 - Pages: 30

Premium Essay

Impotent Music

...INFORMATION RESOURCE GUIDE Computer, Internet and Network Systems Security An Introduction to Security i Security Manual Compiled By: S.K.PARMAR, Cst N.Cowichan Duncan RCMP Det 6060 Canada Ave., Duncan, BC 250-748-5522 sunny@seaside.net This publication is for informational purposes only. In no way should this publication by interpreted as offering legal or accounting advice. If legal or other professional advice is needed it is encouraged that you seek it from the appropriate source. All product & company names mentioned in this manual are the [registered] trademarks of their respective owners. The mention of a product or company does not in itself constitute an endorsement. The articles, documents, publications, presentations, and white papers referenced and used to compile this manual are copyright protected by the original authors. Please give credit where it is due and obtain permission to use these. All material contained has been used with permission from the original author(s) or representing agent/organization. ii T eofContent abl 1.0 INTRODUCTION........................................................................................................................................................... 2 1.1 BASIC INTERNET TECHNICAL DETAILS ........................................................................................................................ 2 1.1.1 TCP/IP : Transmission Control Protocol/Internet Protocol .........................................

Words: 134858 - Pages: 540

Premium Essay

Real

...public, media and regulatory discussions can be observed. The research at hand aims to provide up-to-date background information on HFT. This includes definitions, drivers, strategies, academic research and current regulatory discussions. It analyzes HFT and thus contributes to the ongoing discussions by evaluating certain proposed regulatory measures, trying to offer new perspectives and deliver solution proposals. Our main results are: HFT is a technical means to implement established trading strategies. HFT is not a trading strategy as such but applies the latest technological advances in market access, market data access and order routing to maximize the returns of established trading strategies. Therefore, the assessment and the regulatory discussion about HFT should focus on underlying strategies rather than on HFT as such. HFT is a natural evolution of the securities markets instead of a completely new phenomenon. There is a clear evolutionary process in the adoption of new technologies triggered by competition, innovation and regulation. Like all other technologies, algorithmic trading (AT)...

Words: 30328 - Pages: 122

Premium Essay

Intrusion Detection

.... . . . . . . . . . . . . . 13 Class Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Use case Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Sequence Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Technology Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 INTRODUCTION Intrusion detection is a system or a software application that detects an attack caused by the intruder. It is installed in the network or system to monitor the malicious activities or policy violations and submit the report to the network administration department. The...

Words: 3561 - Pages: 15

Premium Essay

Accenture Eytics

...well as the Accenture policies listed throughout the document and the links at the bottom of each page. To zoom in and out, use the magnifier and back buttons. 10 Best People 14 Client Value Creation 18 One Global Network 24 Respect for the Individual 28 Integrity 36 A Model for Making Ethical Decisions 40 Our Responsibilities 41 Where to Go for Help 42 Index of Key Terms This file is in A4 format. The print feature on the navigation bar sets to your print settings. For further information, access our Policies Website. 2 | Accenture Code of Business Ethics Print Questions ? To All Accenture People: For more than 50 years, our success has been based on a core set of beliefs, behaviors and values that have transcended both generations and geographies. From our earliest days as technology pioneers to our position today as a Fortune Global 500 industry leader—collaborating with our clients to help them become high-performance businesses and governments—Accenture’s men and women have always been committed to upholding the highest professional and ethical standards. Accenture has six core values that are enduring and differentiating, and they continue to serve us well as an organization: Stewardship, Best People, Client Value Creation, One Global Network, Respect for the Individual and Integrity. These simple, yet powerful values have continually guided our...

Words: 15075 - Pages: 61

Premium Essay

Term

...Information Security Program Guide For State Agencies April 2008 Table of Contents INTRODUCTION .......................................................................................................................................................3 A SUGGESTED IMPLEMENTATION STRATEGY .............................................................................................5 SECURITY COMPONENTS ...................................................................................................................................12 RISK MANAGEMENT ................................................................................................................................................12 POLICY MANAGEMENT ............................................................................................................................................14 ORGANIZING INFORMATION SECURITY ....................................................................................................................16 ASSET PROTECTION .................................................................................................................................................18 HUMAN RESOURCES SECURITY ...............................................................................................................................20 PHYSICAL AND ENVIRONMENTAL SECURITY ...........................................................................................................22 COMMUNICATIONS...

Words: 14063 - Pages: 57

Premium Essay

Urban Outfitters

...Threats 11 4 System Description 12 4.1 Physical Environment 12 4.2 Technical Environment 12 5 Plan 12 5.1 Plan Management 12 5.1.1 Contingency Planning Workgroups 12 5.1.2 Contingency Plan Coordinator 12 5.1.3 System Contingency Coordinators 13 5.1.4 Incident Notification 13 5.1.5 Internal Personnel Notification 13 5.1.6 External Contact Notification 13 5.1.7 Media Releases 14 5.1.8 Alternate Site (s) 14 5.2 Teams 14 5.2.1 Damage Assessment Team 14 5.2.2 Operations Team 15 5.2.3 Communications Team 15 5.2.4 Data Entry and Control Team 15 5.2.5 Off-Site Storage Team 15 5.2.6 Administrative Management Team 15 5.2.7 Procurement Team 15 5.2.8 Configuration Management Team 16 5.2.9 Facilities Team 16 5.2.10 System Software Team 16 5.2.11 Internal Audit Team 16 5.2.12 User Assistance Team 16 5.3 Data Communications 16 5.4 Backups 16 5.4.1 Vital Records/Documentation 17 5.5 Office Equipment, Furniture and Supplies 19 5.6 Recommended Testing Procedures 19 6 Recommended Strategies 20 6.1 Critical Issues 20 6.1.1 Power 20 6.1.2 Diversification of Connectivity 20 6.1.3 Offsite Backup...

Words: 17323 - Pages: 70