Preview

Kirk Patrick Samuda, Kirk Samuda, Hacking and Intrusion

Good Essays
Open Document
Open Document
639 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Kirk Patrick Samuda, Kirk Samuda, Hacking and Intrusion
Attack Prevention Article Evaluation
Masters in Information Security and Technology (MSIT / MSc)
Kirk Samuda
CMGT/541
April , 2009
Professor J. Mc Nickle

As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations. According to Mathew, “It is very important for companies to consider the smartest ways to first detect, block, and subsequently investigate employees with malicious motives”; joined to a vigorous external process that outlines preventative mechanisms that are designed and implemented around an ERP that is based on a review of hundreds of attacks. Hence the best way to identify, then possibly prevent an internal or external attack is to start with a security audit specifically created as a countermeasure; simply an attack prevention program. For any information security audit to be effective, with the intent to prevent or reduce attacks; it is absolutely necessary to be proactive and first create an insider threat program, that reinforces the fundamental purpose of the CIA triad which highlights information confidentiality, and how protection of company assets is most vital to the preservation of authorized restrictions and how information is accessed and disclosed. Never allow any type of attack, successful or otherwise to go undocumented or wasted. “If you experience an attack, learn from it,” For example, let us analyze an information security breach case of a financial corporation that caught an employee trying to steal very private company trading algorithms. Accountability and authenticity must immediately be exercised to ensure

You May Also Find These Documents Helpful

  • Powerful Essays

    From this book I take back lot of things related to computers, networks, the government, information security and its importance, and how to handle things under pressure and stress. There are many characters who teach us how to look at situations which actually shows us a way to solve the problem.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303–314, Oct. 1998.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    When an organization uses and relies on computer systems and information technology to assist in running their company(s) and also uses these resources to store important, personal information about clients, customers, employees, and the organization itself, it is important to have the adequate security protection in place to prevent this information from being compromised. The following summary will discuss how IBM prevents security breaches by using technology to reduce the rampant crime committed against them.…

    • 555 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cited: Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett Learning.…

    • 299 Words
    • 2 Pages
    Good Essays
  • Better Essays

    References: Bishop, M., Engle, S., Frincke, D. A., Gates, C., Greitzer, F. L., Peisert, S., & Whalen, S. (2010). A risk management approach to the 'insider threat '. Advances in Information Security, 49, 115-137. doi: http://dx.doi.org/10.1007/978-1-4419-7133-3…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Good Essays

    Cmgt/441 Week 3

    • 768 Words
    • 4 Pages

    Posey, B. (2011, March 11). 10 best practices for windows security. Tech republic, Retrieved from http://www.techrepublic.com/blog/10things/10-best-practices-for-windows-security/2383…

    • 768 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 7 - Info Sec

    • 2576 Words
    • 10 Pages

    8. What is a best practice to deter insiders from even thinking about executing an attack?…

    • 2576 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    [Us as] security professional need to be aware of common attack methods so that they can take proactive steps to prevent attacks [by recognizing] them when they occur and respond [to them] appropriately (James M. Stewart, p. 48).…

    • 1033 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Hacker

    • 1123 Words
    • 5 Pages

    The advancement of information technology spans a lot of areas of our lives. Information technology has made a huge difference in industry, agriculture and services. This in turn boosts up the productivity of the society. However, the development of computer technology also leads to many security problems in our modern society. There has emerged a group of computer savvy people who seeks and exploits weaknesses in a computer system or computer network. Their motivation has put many questions on debating table. On the one hand, many people contend that a hacker is a dangerous person who will probably destroy the whole world’s computer system. On the other hand, others argue that hackers are not dangerous and not causing harm. This essay will discuss the two sides of the coin with regard to hackers with relevant examples.…

    • 1123 Words
    • 5 Pages
    Better Essays
  • Best Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    References: Bidgoli, H. (2006). Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations. John Wiley & Sons, 1008 pp. ISBN: 0470051205, 9780470051207…

    • 1068 Words
    • 5 Pages
    Better Essays
  • Good Essays

    There are several different types of threats that can be posed to the accounting information systems of an organization and when ignored can create grave damage to the organization. One threat to the AIS of the organization is the threat of the unauthorized user. Organization needs to have strict controls on who has access to computers that relate to the information system of the organization t prevent loss or to prevent damage. Unauthorized users can also come in the form of hackers that find back doors into the company’s AIS in order to steal sensitive information or to wreak havoc with the information systems. It is essential in the new Information Age for the management is knowledgeable on the AIS and the needed security measures to protect this system.…

    • 851 Words
    • 4 Pages
    Good Essays
  • Good Essays

    McGregor, J. P. How the TJX Breach May Change Security Awareness. (2007, April 11). Retrieved October 9, 2007, from…

    • 302 Words
    • 2 Pages
    Good Essays