Preview

Cmgt 441 Information Security Research Paper

Satisfactory Essays
Open Document
Open Document
631 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cmgt 441 Information Security Research Paper
Information Security Paper
Masters Degree in Information Technology & Data Security (MSIT/ MSc)
Kirk Samuda
CMGT/441
April , 2009
Professor Mc Nickle

The proliferation of hacking has activated new realization to the importance of security, information security that is; highlighting the need for a more technological and revolutionary methodology applicable to combating cyber criminology. According to politico.com in an article written by Jonathan Fahey on December 22, 2013, very clear is the fact that the hacking of Target Stores is a distinct reflection of two fundamental premises that must be changed. The first premise exposes a technological algorithm that is old and directed along a pathway that lingers on twentieth
…show more content…
What is very clear is that millions of customers, shoppers at various Target Store locations had their financial information stolen. However, what isn’t so clear is how to prevent an attack of this type from recurring. To implement an effective preventative platform, hack proof mechanisms and trained employees must be used simultaneously to monitor, identify, and possibly eliminate virtual foreign and unauthorized invasion. If the invasion includes brute force access, it must immediately be considered an attack on information, causing immediate and drastic measures to be executed impromptu. In approaching preventative mechanisms that are effective against hacking, it is very important that both awareness and attitude is first changed, and then perceptions of information security and how to secure data must be allowed to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    • Your summary should be written in a concise and clear manner that summarizes your policy for readers.…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This paperwork of IT 244 Week 1 Individual Introduction to the Information Security Policy Appendix C comprises:…

    • 396 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    But, the actual compromise data did not fall into the criteria of what the law required for notifications. This created an ethical dilemma for the Executive team, just because the law states that notification does not require notification for the data type in the breach. But, the heavy-handed control of the Executive staff team, he forced public notification that a larger number of data elements were compromised, under protest of other Officers. Even though the first notification was not correct, the media decided to combine both notifications and came to the conclusion of how many data elements were access during the breach. With the prevailing news stories, correct or not, Target’s reputation and sales suffered, Chief Marketing Officer Jeffrey Jones summed it up the best, “That’s hammering us” (Kinicki & Williams, 2013, pg. 37,…

    • 823 Words
    • 4 Pages
    Good Essays
  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    In December 2013 more than 40 million Visas were stolen from about 2000 Target stores by getting to information on purpose of offer (POS) frameworks. This paper will investigate known issues in the Target rupture and consider a portion of the Critical Controls that could have been utilized to both keep this break and relieve misfortunes. From what is thought about the Target rupture, there were different components that prompted information misfortune: sellers were liable to phishing assaults, arrange isolation was deficient with regards to, purpose of offer frameworks was defenseless against memory scratching malware and recognition procedures utilized by Target fizzled. A conceivable answer for counteracting and…

    • 269 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Employing various tools and devices for determining the quality of IT project plans and systems leads to the use of the best practices. Best practices in IT project management summons for various elements and functions that are required and highly instrumental in ensuring the success and development of IT project plans. The best practices approach also requires the review of best practices in order to map out future trends that might are highly appropriate for future situations taking the organization one step ahead of its competitors. Some state that business practices don’t really mean anything anymore. Opinions state that these days it seems like anyone who can pick up a keyboard is issuing best practices. Plus, just because you wrote something doesn’t necessarily mean that it’s always the best of ideas. I think that some of the reasoning behind Arkansas’ ‘Best Practices’ is for the most part stemming from their avid experience. Project Management isn’t just about controlling schedules and costs. Before the execution of any project, an organization must be assured that the project is a wise investment of money and resources, and that it fits with other initiatives. IT departments must be able to deliver each project to the original specifications. Project Management also defines the business controls for delivering within scope. Leading companies launched and maintained successful IT projects by increasing growth and taking advantage of revenue opportunities, improving customer service, gaining strategic advantages over competitors, and becoming better aligned with business needs. Most agencies in Arkansas are required to submit a summation of their project management methodology. All projects are unique and take on different forms that present many degrees of uncertainty. It is important to have a defined formal structure for…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Target a large retail corporation that operates over 1,700 stores across the United States. They also operate as an online retailer at target.com. In 2012 the retailer earned more than $73 billion dollars in revenue and grew their sales by 5.1% from the previous year. Looking at the revenue and sales growth rate it is hard to fathom that more money could not be spent to ensure that consumer data is protected as much as possible. As information security specialists one of the worst things that can happen is our network gets infiltrated and customer information is stolen. On December 19, 2013 Target released a statement stating that they have had an information security breach and suggested that as much as 70 million credit card information had been stolen.…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    CSE 3482 Introduction to Computer Security Introduction to Information/Computer Security Instructor: N. Vlajic, Winter 2014 Learning Objectives Upon completion of this material, you should be able to: • Describe the key security requirements of confidentiality, integrity and availability (CIA). • Describe the CNSS security model (McCumber Cube). • Identify today’s most common threats and attacks against information. • Distinguish between different main categories of malware. Required Reading Computer Security, Stallings: Chapter 1…

    • 1155 Words
    • 11 Pages
    Satisfactory Essays
  • Good Essays

    Ethical Computer Hacking

    • 1026 Words
    • 5 Pages

    "The Year Hacking Became a Business." The Australian 30 Jan. 2007: 31. Newspaper Source. EbscoHost. Pittsburgh Technical Institute. 15 Mar. 2007 <http://search.ebscohost.com/login.aspx?direct=true&db=nfh&AN=200701301031832081&site=ehost-live>.…

    • 1026 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    |L |T |P |CT |TA |Total |ESE | | |5. |ISMP-401 |Dissertation |0 |0 |30 |- | |200 |200 |400 | | | |Total | | |30 | | | | |400 | |…

    • 5382 Words
    • 22 Pages
    Satisfactory Essays
  • Good Essays

    Imagine yourself going into the bank to get money out of your account for your rent or other important bill, and the account is dry and you just got paid the day before..or going to pay a bill with your credit card and card after card is maxed out then you find out that someone has stolen all your information and used all of your resources to live and pay bills. If this happened to me my heart would be beating so fast in panic id probably pass out considering I have so many kids to provide for. Well it happens everyday to people everywhere all over the world. One of the major problems causing this is called hacking which is defined by the company who created the website the free dictonary dot com, Houghton mifflin company, as to gain access to a computer file or network illegally or without authorization. It is a big problem not just here but in other countries as well.One incident id like to mention is the playstation store being hacked into…

    • 521 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Security

    • 792 Words
    • 4 Pages

    The importance of this fact needs to be clearly highlighted so that adequate measures will be implemented, not only enhancing the company's daily business procedures and transactions, but also to ensure that the much needed security measures are implemented with an acceptable level of security competency when there’re so many threats to the computer out there.…

    • 792 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    C++ Programming

    • 331 Words
    • 2 Pages

    (1) Internet Security Jayalakshmi Srinivas: R. Kamatchi (2) SQL 2 Brijesh Y. Joshi: Abhijit Patil…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    cyber crime and targets

    • 1831 Words
    • 8 Pages

    References: Goodwin, B. (2000, August ). Safeway site is still down after hack attack.. Company Business and Marketing.…

    • 1831 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    waste disposal

    • 7404 Words
    • 24 Pages

    There is no disputing the facts... the number of hacking and intrusion incidents is increasing year on year as technology rolls out. Unfortunately in todays inter-connected e-commerce world there is no hiding place: you can be found through a wide variety of means: DNS, Name Server Lookup, NSlookup, Newsgroups, web site trawling, e-mail properties and so on.…

    • 7404 Words
    • 24 Pages
    Powerful Essays