Common Information Security Threats

Only available on StudyMode
  • Download(s) : 1188
  • Published : November 4, 2012
Open Document
Text Preview
Common Information Security Threats
September 22, 2012

Common Information Security Threats
As company’s dependence on computers and the internet increase, there are more and more threats that they face from hackers and anarchist alike. For ever solution that companies come up with to defend themselves against cyber attacks, those who wish to do harm find other means to attack, it is a constant cat and mouse struggle. If 2011 has been any indication, it is clear that everyone is vulnerable to cyber attacks. There was wave after wave of hacking, malware, and spear-phishing attacks that succeeded in exploiting many well-known businesses, such as RSA and Sony, which lead to the exposure of millions of records. (Schwartz, 2012) The purpose of this paper is to discuss three of the top information security threats that any business and organization face today: breaches, cyber espionage, and mobile malware.

A breach is when there is unauthorized access to someone’s personal information for means to collect, use, or to disclose. These breaches happen mostly when the information is stolen, lost, or disclosed by accident (e.g., a computer containing personal information is stolen or the information emailed to the wrong people by accident.). Breaches may also be a result of errors in an organization’s procedure. Such information that is stolen can belong to a customer, patient, client, or employee. Once a breach has been identified, the organization must take immediate action to address the incident and reduce any additional risk that results from the event. This is when redundancy becomes very important in enterprise architecture because organizational information systems provide a failover mode that helps to ensure that failed components trigger the appropriate backup components with similar capability.

Another common threat that companies face in terms of information security is cyber espionage. This practice is when secrets are obtained without the...
tracking img