Preview

Contemporary Security Issues

Good Essays
Open Document
Open Document
649 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Contemporary Security Issues
CCJS 345
Cotemporary Security Issues
2/19/2014

Cyber security has been slowly taking over as the main concern for security professionals as well as organizations. This is due to a larger emphasis on using paperless methods in order to keep track of customer’s data, financial records as well as many other important documents. Without properly trained IT professionals as well as an increase in maintaining up to date security these attacks will continue to have success. Another issue is the lack of legislation regarding cyber crime and their perpetrators.
Although billions of dollars are spent by organizations and governments in order to protect digital assets news of attacks are reported on, which many times are successful. Despite the fact that myriad tech risks were identified by the study’s 469 participants, many firms aren’t making the grade when it comes to putting the necessary protections in place to combat these threats. Specifically, one-third of organizations with less than $100 million in revenue said they did not conduct any form of IT audit risk assessment, while 42 percent of all surveyed firms reported that in lieu of their own internal resources, they depended on external assistance to inform their IT audit departments. (Caldwell Partners, 2014) Given the large amount of media attention given to cyber-attacks, the lack of internal attention given to cyber security is astonishing. While budget constraints are one factor contributing to a lack of security without integrating some form of internal risk assessment, companies cannot hope to achieve the highest level of security possible. Without consistently updating security systems organizations are leaving themselves open to attacks from outside individuals. This is due to cyber perpetrators constantly looking for ways to side step or penetrate security systems in order to achieve their goals. While the goals of these perpetrators range from



References: Partners, C. (2014, January 24). Addressing the ongoing problem of IT security. Caldwell     Partners. Retrieved February 19, 2014, from     http://www.caldwellpartners.com/addressing-the-ongoing-problem-of-it-security/ Ali, S., Dixon, J., &Padmanabhan, V. (2014, February 12). Why cybersecurity is a strategic     issue. Bain Brief. Retrieved February 19, 2014, from     http://www.bain.com/publications/articles/why-cybersecurity-is-a-strategic-    issue.aspx Cooney, M. (2014, February 5). US Secret Service: Stronger laws could help fight sophisticated     cybercrime. Network World. Retrieved February 19, 2014, from     http://www.networkworld.com/community/blog/us-secret-service-stronger-laws-    could-help-fight-sophisticated-cybercrime

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 2 Assignment 2

    • 457 Words
    • 2 Pages

    Information is an organization’s most valuable asset, yet traditional security practices have either not provided adequate protection of information or have been so restrictive that they have prevented organizations from making the maximum use of information to innovate, collaborate, and achieve competitive advantage. This is primarily due to the reactive approach to security that many organizations have been forced to take in the past. Rather than viewing information security as a business enabler, they have tended to view it as a business inhibitor—a defensive strategy, designed to prevent bad things from happening.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Whitman, M., & Mattord, H. (2010). Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    In a global economy, businesses thrive with good Information technology infrastructures. Information technology plays vital roles in successful businesses. Although tools like online advertising, and e-commerce can help businesses thrive in today’s global economy. However, this paper will focus on the importance of Information security functions within Ecolab’s IT organization. Furthermore, the impacts of information security functions from a business perspective will be discussed.…

    • 1661 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Cybersecurity Trends

    • 530 Words
    • 3 Pages

    Because organizations are overwhelmed by hackers and cyber-criminals, there are plenty of jobs in cybersecurity available for IT experts who know how to protect systems and prevent intrusions. Cybersecurity professionals may choose to work in the private sector or the public sector with an agency of The Department of Homeland Security (DHS).…

    • 530 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Mod 1 Case Assingment

    • 1465 Words
    • 5 Pages

    The governance framework is very important because it gives us a road map for the application, evaluation and improvement of information security practices (Information Security Governance: Toward a Framework for Action). This frame work includes legislation, regulations, corporate structure, corporate culture and the importance of information security to the organization. It also acts as a mechanism to deliver value, mange performance and also mitigates risk. Another important fact about this framework is that it gives us a way to assign accountability for each decision and performance. It ensures that policies, procedures, management and other related management…

    • 1465 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Law & Policy Case Study

    • 1839 Words
    • 8 Pages

    Whitman, M. E., & Mattord, H. J. (2007). Legal, Ethical, and Professional Issues in Information Security. In M. E. Whitman, & H. J. Mattord, Principles of Information Security (pp. 90-94). Course Technology.…

    • 1839 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Manufacturing Audit Risk

    • 1585 Words
    • 7 Pages

    As Information Systems become more complex and business organizations become better prepared at protecting these systems so has the means in which attacks on these systems evolved. Many new issues have emerged and are changing the way in which or world views hackers and the chaos that these individuals can cause. The purpose of this section is to discuss some of the most visual and controversial of these issues. Finding solutions to avoid these attacks are what drives the need for security and security systems to constantly evolve and adapt to new threats and avoid being overrun and or shut down due to malicious actions of hackers who only wish…

    • 1585 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Gregg Shafel Case Summary

    • 422 Words
    • 2 Pages

    Technology innovation and global competition are two essential aspects of modern business, as a result companies invest a great deal in these areas (LeClair, 2000). It is imperative for senior management, like Steinhafel and his senior managers, to identify the information important to their business and which information is most valuable so that they can develop an IT infrastructure to protect those assets and then educate, inform, and train employees in a way that fosters a culture in which security is a priority (Dutta, 2002). With planning, innovation, and training a company can face the ever changing threats of the cyber world with increased confidence and thereby gain the confidence and business of their customers (Dutta,…

    • 422 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Many expects have voiced their concerns about cybersecurity. The growing rate, sophistication and impacts of attacks on information systems that have happen in the United States consensus have built a framework for cybersecurity. The Federal role in cybersecurity includes assisting in protecting the organizations systems that are nonfederal and federal. This Individual Assignment will discuss cybersecurity laws, The Sarbanes-Oxley Act. Cybersecurity regulations, legal concepts, the reasons and methods of government interventions, the impacts and effects cybersecurity has on national security, and how the federal and state regulations create positive and negative effects for national security.…

    • 628 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The rapidly evolving economy has led to companies being largely controlled by an IT infrastructure as it is an important part of business operations, and it bridges communication gaps well. Those corporations that pay no heed to the necessity of computer forensics in the modern age risk damage to digital resources and intellectual property. A singular breach into the system can lead to massive financial loss[1]; subsequently leading to bad publicity of the business and prolonged losses in the long run. The methods used by attackers to breach into networks are constantly advancing as a result of experts who are able to fend off attacks. This is a cause for concern for experts worldwide. It is important to bear in mind that threats can be both…

    • 217 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Penetration Testing

    • 3406 Words
    • 14 Pages

    As electronic commerce, online business-to-business operations, and global connectivity have become vital components of a successful business strategy, enterprises have adopted security processes and practices to protect information assets. But if you look at today's computing environments, system security is a horrible game of numbers: there are currently over 9,223 publicly released vulnerabilities covering known security holes in a massive range of applications from popular Operating Systems through to obscure and relatively unknown web applications. [01] Over 300 new vulnerabilities are being discovered and released each month. Most companies work diligently to maintain an efficient, effective security policy, implementing the latest products and services to prevent fraud, vandalism, sabotage, and denial of service attacks. But the fact is you have to patch every hole of your system, but an attacker need find only one to get into your environment. Whilst many organisations subscribe to major vendor's security alerts, these are just the tip of the security iceberg and even these are often ignored. For example, the patch for the Code Red worm was available some weeks before the worm was released. [02]…

    • 3406 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Internet Security

    • 1581 Words
    • 7 Pages

    Cited: Bowling, Brian. "Internet Crime a Growing Worry." Greensburg: Tribune Review, 30 October 2012. B1 and B10. Print.…

    • 1581 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Notes

    • 1370 Words
    • 6 Pages

    The company decided to put in place a mechanism dealing with vulnerability assessment, as well as a strategy to check the company’s network system to assess any form of vulnerabilities which could allow any external unauthorized access to the facility. In the past, the company had experienced a case of malware infection which nearly interfered with network system, almost bringing it down. This called for an urgent need to check the IT check up in preparation for an external audit. Therefore, the need for cyber security capability within organizations has been highlighted recently with the increases in cases of hacking which have been consistent within the organization before realizing that it was under attack. According to Wilshusen, 2010, cyber attack is likely to have far reaching consequences to any organization as making efforts to build and maintain trust and repair potential reputation with the customers and stakeholders.…

    • 1370 Words
    • 6 Pages
    Good Essays