Kirk Patrick Samuda, Kirk Samuda, Hacking and Intrusion

Good Essays
Attack Prevention Article Evaluation
Masters in Information Security and Technology (MSIT / MSc)
Kirk Samuda
CMGT/541
April , 2009
Professor J. Mc Nickle

As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations. According to Mathew, “It is very important for companies to consider the smartest ways to first detect, block, and subsequently investigate employees with malicious motives”; joined to a vigorous external process that outlines preventative mechanisms that are designed and implemented around an ERP that is based on a review of hundreds of attacks. Hence the best way to identify, then possibly prevent an internal or external attack is to start with a security audit specifically created as a countermeasure; simply an attack prevention program. For any information security audit to be effective, with the intent to prevent or reduce attacks; it is absolutely necessary to be proactive and first create an insider threat program, that reinforces the fundamental purpose of the CIA triad which highlights information confidentiality, and how protection of company assets is most vital to the preservation of authorized restrictions and how information is accessed and disclosed. Never allow any type of attack, successful or otherwise to go undocumented or wasted. “If you experience an attack, learn from it,” For example, let us analyze an information security breach case of a financial corporation that caught an employee trying to steal very private company trading algorithms. Accountability and authenticity must immediately be exercised to ensure

You May Also Find These Documents Helpful

  • Good Essays

    Studying Religion Kirk Samuda REL/134 August 4, 2014 Mr. Al Conway Essential for any tradition to be considered a religion, is the demonstration of traits and characteristics that are intended to join the human existence with something sacred or spiritual. The philosophy that engages the gathering of people together for worship, is a trait reflecting a merger between the human self and something sacred; that may be considered religious, yet not necessarily a religion. It is my opinion…

    • 976 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Kirk Patrick Samuda,

    • 326 Words
    • 2 Pages

    Kirk SamudaUniversity of Phoenix | April 21, 2013BSA/375 | | Week (1) Mr. Jeffrey Mc Nickle Information technology and its highlighted importance in enabling business success, brings to the forefront the responsibilities of the Systems Analyst, and how critical the role is in a systems development project. To simplify the role, must in no way down play the importance of the many responsibilities this position has assigned to it; as it continues to expand and evolve, ready to create resolves…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Kirk Samuda

    • 731 Words
    • 3 Pages

    Kirk Samuda University of Phoenix BSA/375 Service Request2_Riordan Manufacturing The application architecture and process design phase are both subsequent steps that heavily depends on all the information acquired during the Analysis process of this project. To understand the intricate role of application architecture, HR must appropriate its significance by acknowledging that the current HR system does not permit continued and simple interface between information in one…

    • 731 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Using Roles Paper Kirk Samuda CMGT/545 August, 2009 Professor Juan Van McBride Financial Services in its effort to control data access must emphasize on the need for all networking administrators to carefully restrict employee’s data access privilege, based on the role each employee is assigned within the organization. It is essential for the company to outline in its Business Requirement Document (BRD) the need for each employee to be assigned specific separating duties, and that…

    • 1172 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Kirk Samuda University of Phoenix NTC/362 Week (3) To understand the importance of communication protocols, it’s necessary to understand what communication protocols are, and there purpose. A communication protocol is a formal description of various digital message formats and rules that are required to permit the exchange of messages in or between computing systems. Communications protocols are responsible for authentication, error correction and detection, and signaling. They…

    • 1051 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Kirk Samuda University of Phoenix NTC/362 Designing a Hospital Computer Network The fundamental characteristics of the Patton-Fuller Community Hospital network components, though operational do require an immediate upgrade to permit the changes forecasted. It’s very important that I highlight the present information technology infrastructure, with the intent to analyze its components and capabilities, and make recommendations for effective technological changes. Patton-Fuller…

    • 530 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Kirk Samuda University of Phoenix NTC/362 Week (2) Understanding the nature of digital signals, binary, and other multi-level signal types do require an explanation of the two most prominent telecommunications types that exist, and examples of how they are applicable to specific devices, the binary is association and its function. (Please note that the majority of the information below are extracts from various websites, used to validate and support a theoretical…

    • 925 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Kirk SamudaUniversity of Phoenix | April 28, 2013BSA/375 | | Week (2) Mr. Jeffrey Mc Nickle A brief analysis of Riordan manufacturing HR system reflects an obvious absence of automated integration via a Wide Area Network for the HR Department. The present methodology applied to the gathering and sharing of information isn’t effective and must be upgraded promptly to permit positive changes throughout Riordan. As such, a key area of focus is the acquisition of relevant and effective information…

    • 1085 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Kirk Samuda University of Phoenix NTC/362 Week(1) Mr. Juan De la Matta Table showing important telecommunications evolution timeline Year Description Inventor Objective 1876 Invents Telephone Alexander Graham Bell Single Communication 1877 Telephone Switchboard was invented Alexander Graham Bell Multiple Communications, dependent on Operator 1891 Dial Telephone invented Almon Strowger Not dependent on Operator 1947 Transistor was invented…

    • 676 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Kirk Samuda University of Phoenix BSA/375 Week (4) Mr. Jeffrey Mc Nickle Riordan Manufacturing must acknowledge that the initiation of any project can get a black eye because of implementation problems. As such, they should realize that the major overall problem with implementation is that complexities associated with it, usually occurs when the solution is deployed. Hence, many of the details of implementation must be planned ahead of time. The HR & IT departments cannot…

    • 1463 Words
    • 6 Pages
    Powerful Essays