Preview

Information Security and Managment

Powerful Essays
Open Document
Open Document
2132 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security and Managment
Contents
Newspaper Articles on Information Security Threats 2
Methods of Spreading Awareness 3
Potential Threats 5
Classified Letter 6
References 9

Newspaper Articles on Information Security Threats
The number of articles found, discussing and reporting the threat to information security were four. A brief summary of each is given as follows:
The first article was the threat posed due to the malware viable and distributed on the internet. The social networking websites and other free sources of software are major source of such malware. The content comes to the user disguised as a message or a statement from a friend. It turns out to be a collection of malware and virus which affect an individual’s computer in drastic form. These malware are easy to install and one or two wrong step on the part of the users can result in large problem. Such malware are difficult to identify and occur on daily basis. If activated by mistake, they may result in loss of large amount of data crashing of an individual’s computer, or even loss of memory. The article goes on to warn online users to be aware of the potential threats posed and be extremely careful while opening such software on one’s computer.
The second article discussed the threat posed to information security via the hacking of one’s internet addresses. The massages sent via such sources are normally spam or virus in nature. This also leads to the person, whose email id is being used to send such messages. It also happens that the mails sent may be derogatory in nature and may lead to stressful conditions in a person’s life. The best way to prevent such conditions is to keep all forms of identification personal, and to not use any form of public computers.
The third article discussed the lack of information security provided by mobile phone networks. With the advent of the smart phones and the usage of the internet becoming a daily process on one’s mobile phone, the attacks on information security have



References: * Gudena, C. (2008). Information Security Awareness * De Borchgrave, A., Cilluffo, F. J., Cardash, S. L., & Ledgerwood, M. M. (2001).Cyber threats and information security: meeting the 21st century challenge (p. 57). CSIS Press * Whitman, M. E. (2003). Enemy at the gate: threats to information security.Communications of the ACM, 46(8), 91-95 * Whitman, M. E., & Mattord, H. J. (2011). Principles of information security. Course Technology Ptr

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Satisfactory Essays

    MacSweeney, G. (2000). When "I love you" isn 't so sweet. Insurance & Technology, 25(7), 7.…

    • 680 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Better Essays

    3. Conklin, W., & White, G. (2010). Principles of Computer Security (2nd ed.). Chicago, IL: McGraw-Hill.…

    • 1124 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Antivirus 1

    • 353 Words
    • 2 Pages

    [1] Bulowski points out that most antivirus programs also protect against worms and Trojan horses (Bulowski, 2008)…

    • 353 Words
    • 2 Pages
    Good Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Mobile devices such as smartphones, PDAs, tablets, and netbooks have become an integral part of everyday business operations. Millions of people log into their company’s secure network on mobile devices via wireless Internet or even accessing their email, making sensitive data more susceptible to data theft and hacking. Mobile technology is advancing at such a fast pace, making it harder for IT managers to keep up with newly emerging threats. Since the smartphone emerged in the business scene, cybercrime has increased exponentially. Data security has now become the main focus for most IT managers in larger corporations.…

    • 1078 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The thing about not having any kind of anti-virus protection can destroy a computer’s system. You need to have an anti-virus protection on the computer so that you know the information that is stored is safe and also know that the virus will not crash your system. There are different types of things that can harm your computer, such as malware, adware, spyware, Trojan, rootkits, backdoor, and etc. I would recommend having some kind of anti-virus on your computer so that nothing will happen, it’s not saying this will not happen but you will have a better chance on it not happening to your computer if you put some kind of anti-virus on your computer and run a scan on a regular basics.…

    • 651 Words
    • 3 Pages
    Good Essays