Information Security

Better Essays
Information Security
American Public University
Professor Michael Brown
August 10, 2012

One of the biggest issues in the Information Technology field these days is information security. Today almost anything can be found on the internet. Even like how to videos on how to put in a window, break-into a house, or even hack computers. The digital age has many perks but it also has many down falls to it as well. The perks that we enjoy so much from the internet also leaves us open to identity theft and company information theft. This gives Information Technology professionals a lot to think about when they consider Information Technology. One of the biggest threats facing the IT industries today is the end users non-malicious security violations that leave companies vulnerable to attack. In a recent Computer Security Institute survey, 41 percent of the participating U.S organizations reported security incidents. (Guo, 2012 p. 203-236) Also according to the same survey it was found that 14 percent of the respondents stated that nearly all of their company’s loses and or breaches were do to non-malicious and or careless behavior by the end users. (Guo, 2012 p. 203-236) Some of the end users behaviors that help these threats along were the peer-to-peer file-sharing software installed by the end user that might compromise company computers. Some other examples of security being compromised by end users would be people that use sticky notes to write there passwords down and leave them where other people can see them and employees that allow other employees to use their work station without knowing what they are doing on their work station. This seemed to be prevalent in companies where the end users perceived that threat was at the low end. This means that if the end user does not perceive a security threat or a consequence to their action they will continue to practice non-malicious security violations without any thought to the potenal

You May Also Find These Documents Helpful

  • Powerful Essays

    Information Security

    • 1955 Words
    • 8 Pages

    Information Security How to provide it? A Research Paper Presented to The faculty of the De La Salle Lipa In Partial fulfillment Of the requirements for the Course Communication Skills 2 By: John Michael T. Imperial King V. Benedicto ABSTRACT: This research paper provides information about information security. Information security is about protection of important files and data. It is about stopping hackers from breaching over your files and maintaining the…

    • 1955 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Information Security

    • 874 Words
    • 4 Pages

    (assuring the security of utility services) related to information security? Information security is the protection of information and it is critical elements, including the systems and hardware that used, store, and transmit that information, Thus, assuring the security of utility services are critical elements in information system. 4. What type of security was dominant in the early years of computing? The type of security was dominant in the early years of computing security was entirely physical…

    • 874 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    information security

    • 528 Words
    • 3 Pages

    Information security Information Security Attributes: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are composed in three main portions, hardware, software and communications with the purpose to help identify and apply information security industry standards, as mechanisms of protection and prevention, at three levels or layers: physical, personal and organizational. Essentially, procedures or policies are implemented to tell people (administrators…

    • 528 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Information Security

    • 813 Words
    • 4 Pages

    information security. 1. What do you understand by information security? Explain the CIA triad. Information security:is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction it has also be define as the protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or…

    • 813 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Information Security

    • 2381 Words
    • 10 Pages

    TRUST, SECURITY & PASSWORDS SURVEY JUNE 2012 ©2012 Cyber-Ark Software, Inc. | www.cyber-ark.com 2 Contents page Page 3 Pages 4 – 13 Executive Summary Key Report Findings  Page 4: Insiders Considered Greatest Organizational Security Threat  Page 5: Privileged Accounts Are Increasingly Targeted – Regardless of Attack Entry Point  Page 5: High Profile Security Incidents Impact Organizational Security Strategies  Page 6: Organizations are taking a broad approach to security in 2012…

    • 2381 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Information Security

    • 23429 Words
    • 94 Pages

    today. They received a report on the expenses and lost production from the worm outbreak last month, and they directed us to improve the security of our technology. Gladys says you can help me understand what we need to do about it.” “To start with,” Charlie said, “instead of setting up a computer security solution, we need to develop an information security program. We need a thorough review of our policies and practices, and we need to establish an ongoing risk management program. There are…

    • 23429 Words
    • 94 Pages
    Powerful Essays
  • Powerful Essays

    Information Security

    • 2061 Words
    • 9 Pages

    PROTECTION OF INFORMATION Abstract: In this paper an overall study of information protection is presented. The state of information and its types also given, methods of computer information systems and its aspects and measures of information protection discussed. A state of art of the current malware and its evolution is carried out. Keywords: Information protection, information sources, computer crimes, hackers, malware INTRODUCTION Rapid development of automation…

    • 2061 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Information Security

    • 11954 Words
    • 48 Pages

    National Cyber Security Research Agenda — Trust and Security for our Digital Life — Version 1.2 Editors: dr.ir. Herbert Bos (Vrije Universiteit Amsterdam) prof.dr. Sandro Etalle (Technische Universiteit Eindhoven) dr.ir. Erik Poll (Radboud Universiteit Nijmegen) Contents 1 A National Research Agenda for Cyber Security 2 Focus and objectives 3 The many aspects of cyber security 4 Setting the research agenda 4.1 Contexts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .…

    • 11954 Words
    • 48 Pages
    Good Essays
  • Good Essays

    Information Security

    • 2188 Words
    • 9 Pages

    Characteristics of Information Security; The extended characteristics of information security as proposed by (Whitman, M.E. & Mattord, H.J, 2010) are planning, policy, programs, protection and project management. Being highly respectable experts in the field of information technology, specifically information systems and security, transfers credibility and authenticity to the anticipated theories. The six characteristics will now be explained. Planning; The planning stage in Information Security (InfoSec)…

    • 2188 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Information Security

    • 1992 Words
    • 8 Pages

    4. Implementation 4.1 mobile website or application When we are planning to establish a mobile presence for PAAC one of the first considerations that will likely come to mind is whether we want to create a mobile application for users to download (app) or a mobile website, or perhaps both. Mobile websites and apps can look very similar at first-glance, and determining which is most suited to PAAC’s needs will depend upon a number of factors, including target audiences, available budget, intended…

    • 1992 Words
    • 8 Pages
    Good Essays