Preview

Preventing Security Breaches

Good Essays
Open Document
Open Document
555 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Preventing Security Breaches
Preventing Security Breaches
Ka 'Sandra Johnson
BIS/221
December 8, 2014
Jamie Telesca
Preventing Security Breaches
When an organization uses and relies on computer systems and information technology to assist in running their company(s) and also uses these resources to store important, personal information about clients, customers, employees, and the organization itself, it is important to have the adequate security protection in place to prevent this information from being compromised. The following summary will discuss how IBM prevents security breaches by using technology to reduce the rampant crime committed against them. IBM’s Security Measures
The International Business Machines (IBM) is an American multinational technology and consulting corporation that manufactures and markets computer hardware and software, and offers infrastructure, hosting and constructing services in areas ranging from mainframe computers to nanotechnology. The total revenue for 2013 was 99.751 billion dollars, and employed 431,212 (2013, Reuters), which is why it is important for them to have security covering every aspect of their company. In addition to their already proven security services portfolio, IBM is now including new enhanced intelligence tools and services that provide deeper, real-time analysis of advanced threats. These services can help organizations make rapid decisions to prevent security breaches from impacting the business, by detecting outlying behavior and threading together diverse contextual data.
There are sources such as the Cloud, mobile computing applications, and social media that has critical information that can affect company’s security profile, so according to the vice president of IBM’s Security Services Marisa Viveros, “The company is using analytics to anticipate threats as they appear instead of after the fact”. Listed below is a chart of the IBM analytics tools and services.
New Suspicious Host



References: ProQuest.com. (Dec 1, 2011) Security Portfolio/Analytics Tools Prevent Breaches. Retrieved from http://search.proquest.com.ezproxy.apollolibrary.com/docview/906639289?pq- origsite=summon Reuters.com. (2012-2013) IBM Company Overview. Retrieved from http://www.reuters.com/finance/stocks/companyprofile?/symbol=ibm

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Unit 4

    • 1878 Words
    • 8 Pages

    Organizations invest a large portion of their information technology budgets on security applications and services, such as antivirus software, firewalls, and encryption. But no matter how much security hardware or software you deploy, how tightly you control the rights of users, or carefully you configure security permissions on your data, you should not consider the job complete unless you have a well-defined, timely auditing strategy to track the effectiveness of your defenses and identify attempts to circumvent them.…

    • 1878 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    In reviewing the current business process, geographic layout, current IT architecture and network infrastructure there were some security issues that could and should be improved upon. Currently the existing security policy is not sufficient for the needs of the company. It is being evaluated every two years and there appears to be no encryption software use to prevent the possibility of data being mishandled, lost or stolen. A security “policy begins with assessing the risk to the network and building a team to respond. Continuation of the policy requires implementing a security change management practice and…

    • 679 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Swot Analisis

    • 433 Words
    • 2 Pages

    This business strategy really takes into practice all the core values of the company. It responds to the results from observing what is happening with clients, and the subsequent implementation of new technologies tailored to their specific needs in order to get "client's success”.…

    • 433 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Security Awareness Policy

    • 1733 Words
    • 3 Pages

    with IS security policies by signing a compliance agreement that is retained in their personnel…

    • 1733 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    The use of information technology in business presents major security challenges, poses serious ethical question, and affects society in significant ways. Especially, the computer crime is a growing threat to society and is caused by the criminal or irresponsible actions of individuals who are taking advantage of the widespread use and vulnerability of computers and the Internet and other networks. It presents a major challenge to the integrity, safety, and survival of most business systems.…

    • 1690 Words
    • 7 Pages
    Better Essays
  • Best Essays

    Ibm Business Strategies

    • 1652 Words
    • 7 Pages

    IBM is one of the largest globally integrated enterprise in the world and since 2000, the company has spent over $70 Billion on research and development to implement innovation to technology that supports Big Data, cloud, mobile and social computing. The company boasts the world’s largest cloud for analytics and allows over 200,000 employees access to perform analytics on multitude of business functions (sales forecasting, skills evaluation etc.) while significantly improving upon project delivery time. The company has seen a sharp change in direction in the previous decade from hardware production to Services and Software units now taking the driving seat for revenue generation. Services and Software are now responsible for 41% and 44% of profit respectively (2015 IBM Road Map, 2012)…

    • 1652 Words
    • 7 Pages
    Best Essays
  • Powerful Essays

    Ibm Strategic Plan

    • 8468 Words
    • 34 Pages

    At IBM, we strive to lead in the invention, development and manufacture of the industry's most advanced information technologies, including computer systems, software, storage systems and microelectronics. We translate these advanced technologies into value for our customers through our professional solutions, services and consulting businesses worldwide. Create experiences that combine the magic of software with the power of Internet services across a world of devices We recognize and seize opportunities for growth that builds upon our strengths and competencies N/A…

    • 8468 Words
    • 34 Pages
    Powerful Essays
  • Good Essays

    Information system has been playing a grave essential role in daily business activities. Over the past decade, the detection rate of computer crimes concerning information system attacks has risen sharply. According to Kunz and Wilson (2004), reported computer crimes have been septupled from 2000 to 2003 and leads to inestimable economic loss. Therefore, themes on information security, especially the prevention of computer fraud, have attracted increasingly attentions (Romney and Steinbart, 2009). However, it seems that perpetrators can always find new techniques to theft invaluable business secrets stored, processed or protected by those information systems. Moreover, some abuse techniques have been used in economic espionage, which causes a yearly loss of $250 billion (ibid). Oracle Corp vs. SAP AG could be one of the relating cases occurred in the recent 2007 and is not yet closed till present. This essay will firstly introduce the Case. Then by using Fraud Triangle, analyze the reason of SAP’s commitment of computer fraud and data theft. Finally, suggestions on how to improve the security of company’s information system will be addressed with some reflections of the Case.…

    • 2645 Words
    • 11 Pages
    Good Essays
  • Satisfactory Essays

    During Week 2, our team focused our collaborative discussion on different technologies that businesses can use to prevent security breaches and reduce the risk of cyber-attacks they are increasingly experiencing. To aid in our discussion, team member, Jennifer Ashton, posted an article entitled “The Right Technology Fix Can Help Prevent Breaches”, written by author, Tim Horton. Mr. Horton’s article remarked on the rising number of data breaches, how often they affect small businesses, and measures that organizations can employ to avoid future intrusions.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    * Deploying advanced security intelligence solutions can mitigate the impact of cyber-attacks. Organizations that deployed security information and event management (SIEM)…

    • 1928 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    As we all know, security is broad. Firms with the latest technology handle numerous tasks at the same time. This ranges from surveillance, coordination between employees and monitoring clients’ premises, among others. Additionally, latest technology ensures work is efficiently handled when compared to human…

    • 725 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    In this topic we will be discussing six computer crimes and how they are committed. We will also look at laws that protect users against these specific crimes. At the end, we will look at ways in which users and corporations can protect themselves against computer crimes physically, using software, electronically and what controls management can implement to safeguard company IS infrastructure. At the end, we will explain ways in which individuals as well as company management can safeguard against computer crime.…

    • 5098 Words
    • 21 Pages
    Powerful Essays