Information Systems Security and Control

Only available on StudyMode
  • Download(s) : 484
  • Published : April 30, 2011
Open Document
Text Preview
CS 4550
Information Systems Security and Control

When a computer connects to a network and engages in communication with other computers, it is essentially taking a risk. Internet security involves the protection of a computer's Internet account and files from intrusion of an unknown user. Internet security has become an alarming issue for anyone connected to the net. This research paper argues the need for security over corporate intranets that have been dealing with the lack of security within the internet and the numerous attacks and malware threats that hackers use to breach security measures. A corporation uses a private computer network that uses Internet Protocol technologies to securely share any part of an organization's information or network operating system within that organization. This is known as the intranet which refers to a network within an organization and is used in contrast to the term internet which is a network between organizations. The intranet, a network belonging to an organization or a corporation, is accessible only by the members and employees with the proper authorization. The main purpose of an intranet is to compute resources among employees such as network usage data or to share company information such as company policies, job postings, company events, product literature, and so on. This paper also discusses the countermeasures that a corporation can take in order to reduce the impact of a potential attack against its information network established for its specific group of users that communicate and share data amongst each other. Although an intranet is a closed private network within a corporation or an organization that does not mean that it is immune to malware lurking around on the internet. The Internet is an unsecure network that connects all people across the globe and is one of the major means that businesses use to generate revenue either by selling services, products, ideas. There is a wide span of activity taking place on the internet nowadays. Those facts depict the fact that businesses engage in online transactions and offer their goods and services through the internet. The most common practice for all businesses is to have a webpage that can be easily accessible by the public. WebPages are the electronic representations of businesses, one of the gateways that connect the intranet of a business with the internet. Another gateway that has been created within a business which reflects upon the use of the Internet are employees surfing the internet, sending and receiving emails, exchanging instant messages, using social networks (such as Facebook) or even streaming online video (such as YouTube). Employees are unaware of the threats attached to the usage of these services and its effects on computer systems and the intranet of a corporation or organization which is where more than half of malware attacks begin. In some cases the hacker will analyze the infrastructure of the company’s network and their systems and with the use of sophisticated tools, a hacker will search for a loophole which can leave valuable information vulnerable to exploitation. A hacker could potentially gain access to the company’s network or sometimes the exploitation may begin from inside the company’s network if a malware program has gained access to the system. Corporate networks are in danger from every kind of malware threat, virus, network traffic and anything else that could potentially slow down the company’s system or damage it, any kind of information leakage of any sort what will cost the organization money and reputational lose. Surveys have shown that from year to year the threats are growing and evolving and as time passes attackers are finding ways to adapt their programs while creating new ones that will remain undetectable and that will outsmart the best security systems (Cisco and IronPort, 2008: 4). More specifically according to a survey by the end of 2006 many companies found...
tracking img