Preview

Itm 431 Module 1 How to Achieve Business Information Security in Cyberspace

Better Essays
Open Document
Open Document
1348 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Itm 431 Module 1 How to Achieve Business Information Security in Cyberspace
In the 21st century, a business without a network mirrors a city with no roads. Small businesses, in particular, arguably have a greater need for network connections and information systems. Small businesses rely on information systems for several things, to include their communication and customer database.
Small businesses rely on network connectivity for communications. With the advancement in Voice Over Internet Protocol (VOIP), many businesses are using the internet to save on phone costs. Additionally, it is common for a business to have an in-house communications system. Take some installations in the Air Force for example; they use an Instant Messaging (IM) service for member-member contact. Many times, it is easier to reach someone through IM or social networking. However, these commodities present their own challenges about IT security. However, that is not all that needs protection. In fact, in a more broad view, communication is viewed as a small bite.
When a business sells its product/s online, it is at distinct advantage over mom and pop stores because they have to collect certain data to complete the transaction; shipping, credit card, billing, and personally identifiable information (PII). (Bradley, 2010) This system is located on a network accessible to employees in order to conduct business. Companies are not only morally obligated to protect customers’ information; it’s the law. The May 2002 Financial Information Safeguards Rule requires businesses to develop a written information security plan that describes, among other things, the specific ways their employees should protect consumer information. The plan must be appropriate to the business's size and complexity, the nature and scope of its activities, and the sensitivity of the information its employees encounter, and must be regularly monitored. (Federal Trade Commission, 2002) The company must consider all areas of its operation, including three that are particularly important to



References: Bradley, H. (2010, April 21). Customer Databases as Marketing Tools. Retrieved November 20, 2012, from Small Business Computing: http://www.smallbusinesscomputing.com/emarketing/article.php/3877761/Customer-Databases-as-Marketing-Tools.htm Federal Trade Commission. (2002, October 17). FTC Offers Guidance on How to Protect Customer Information. Retrieved November 20, 2012, from Federal Trade Commission: http://www.ftc.gov/opa/2002/10/safeguard.shtm Indiana University. (2012, August 21). Knowledge Base. Retrieved November 20, 2012, from University Information Technology Services: http://kb.iu.edu/data/aoru.html Kessler, G. C. (1996, January). Passwords - Strengths and Weaknesses. Retrieved November 20, 2012, from garykessler.net: http://www.garykessler.net/library/password.html Natarajan, R. (2008, June 8). The Ultimate Guide For Creating Strong Passwords. Retrieved November 20, 2012, from The Geek Stuff: http://www.thegeekstuff.com/2008/06/the-ultimate-guide-for-creating-strong-passwords/ Schulman, A. (2012). Top 10 Database Attacks. Retrieved November 20, 2012, from The Chartered Institute for IT: http://www.bcs.org/content/ConWebDoc/8852

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In the user domain, the weak link is the user. Simple passwords can be a major problem so you must use complex passwords with eight or more characters, upper and lower case, and special characters. Passwords will be changed monthly and the same password cannot be used within a twelve month period.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the user domain, one of the easiest ways for the system to be compromised is through the users. Simplicity of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Bsa 310 Week 2

    • 653 Words
    • 3 Pages

    IT security policies need to address the customers concerns in regards to handling their personal information with a third…

    • 653 Words
    • 3 Pages
    Good Essays
  • Good Essays

    a. To maximize confidentiality and to make passwords harder to crack, passwords should be of a minimum length (8 characters or more), complex (upper/lower case, numbers, and special characters), have a minimum password age (change periodically), and password history must be enforced (cannot use the last 10 passwords).…

    • 518 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    It 244 Final

    • 2332 Words
    • 10 Pages

    Customers trust this organization with highly private personal and financial information. That makes it our responsibly to handle that information with the utmost respect and care. Through the controls and procedures outlined in this policy we can achieve those goals.…

    • 2332 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    When planning password policy’s stress extra protection, in some cases, a good password is enough protection to keep out intruders. In others, it’s just a start. Encryption and one-time passwords add extra protection to systems. Encryption means garbling the password to protect from sniffers or other onlookers, through a particular scheme that can be deciphered from the other end of the connection. Users should exercise extreme caution when writing down or storing passwords. Stories of hackers obtaining passwords through shoulder-surfing and dumpster diving are not urban myths, they are real. Here a good practice for a company to…

    • 428 Words
    • 2 Pages
    Good Essays
  • Good Essays

    References: Clifford, M. (2004). Identifying and Exploring Security Essentials. Upper Saddle River, NJ: Pearson Prentice-Hall…

    • 705 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    In the article, “The psychology of password management: a tradeoff between security and convenience”, the author…

    • 380 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Power, Richard, 1999 CSI/FBI Computer Crime and Security Survey, Computer Security Journal, Volume XV, Number 2, 1999, pp. 32.…

    • 2543 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    References: Schwartz, M. J. (2012, January 17). From cyber espionage to Android malware, expect to see a greater variety and quantity of attacks than ever before. Retrieved from http://www.informationweek.com/security/vulnerabilities/10-security-trends-to-watch-in-2012/232400392…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Making Strong Passwords

    • 1119 Words
    • 5 Pages

    Gupta, M., & Sharman, R. (2009). Social and human elements of information security: Emerging trends and countermeasures. Hershey, PA: IGI Global.…

    • 1119 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    tttttttttttttttt

    • 900 Words
    • 3 Pages

    Using information technology, businesses have the ability to view changes in the global markets far faster than they usually do. With so many transactions done online and so much information available online, it’s important to keep all of that safe. Information technology makes it possible for your online data to stay secure until accessed by the proper channels.…

    • 900 Words
    • 3 Pages
    Powerful Essays