Security Issues

Satisfactory Essays
Name: Joseph Odechie Bossman class: 2011 MIS
Course: Operating Systems (Aelaf Dafla)
Article Title: When a security Breach hits Home. By Steve Fox.

The article talks about the most unexpected of data breaches. Mostly in cyber crime, data-thieves, target large-scale networks as a means of hijacking important information about credit card numbers of customers or other bank details. However, in this situation, the on-campus clinic database of UC Berkeley (University of California) was breached. "Coughing up tons of data about parents, students and spouses" (Fox, 2009). The unexpected nature of this security breach may be overlooked, since it is "just" a schools clinical database. However such systems contain invaluable information to identity thieves. Information like credit card numbers addresses, etc, which could undermine the safety and security of the individual. This indicates a shift from the normal conventional attacks on financial institutions to poorly secured alternative databases, where cyber criminals can retrieve information about people. The article stipulates that in such a situation, the end users are no longer the weakest link in the security chain. In this sense, most of the blame cannot be put on the end users. "The distinction belongs to the corporations above the chain" (Fox, 2009). It is necessary as end users to keep our computers and all other relevant information safe. However, if companies who are in charge of such sensitive information employ an insecure and shoddy way of doing their job, then security will always be an issue. My verdict is, companies who house information, should know that all data is relevant to a client. So, important mechanisms and policies should be put in place to secure their data.
Bibliography
Fox, S. (2009). When Security breaches the Home. PC Mag

You May Also Find These Documents Helpful

  • Good Essays

    Security Issues

    • 567 Words
    • 3 Pages

    Security is the number one concern in the information technology world. As the 21st century evolves the technology advances with it as well. Information Security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. It revolves around maintaining three basic concepts of information—confidentiality, integrity, and availability. Other basic concepts such as: nonrepudiation, authentication and authorization relate…

    • 567 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Ipv6 Security Issues

    • 3070 Words
    • 13 Pages

    IPv6 Security Issues Internet Protocol v6 (IPv6) is replacing Internet Protocol v4 (IPv4). The need for IPv6 has risen to the forefront due to the depletion of IPv4 addresses. Security concerns and issues have slowed the adoption of the new protocol. Trade information is readily available for IPv6. A simple web search on the topic will lead you to trade magazine articles, books, white paper and even the government agency recommendations. The marketplace is brimming with “solutions” to IPv6 security…

    • 3070 Words
    • 13 Pages
    Best Essays
  • Good Essays

    Security issues in the subfield of international relations are no longer limited to traditional security threats such as military challenges but are now including non-traditional security, including climate change. The international community should do more to tackle the issue of climate change because the long-term effects will not only directly or indirectly threaten national and international security but human security. If climate change is neglected and not properly dealt with by effective…

    • 623 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Web Security Issues

    • 911 Words
    • 4 Pages

    This paper will discuss methods to address client security issues. It will include ways that a Website can be attacked by malicious users. It will discuss how Java script insertion, SQL insertion, hidden field manipulation, header manipulation, and cookies may be used by malicious users. It will discuss how worms and viruses can be introduced to a Website, and the most common method to ensure client security. SQL Insertion Attacks SQL injection is a type attack where harmful code is attached to…

    • 911 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Security and Legislative Issues. For the past few years Luna Sensations has not been focusing a lot on security in the workplace, because of the breaking they suffered in 2011. Luna Sensations wants to venture into E- Business so the company has to ensure that all security measures put in place works properly. Some of the physical security elements affecting Luna Sensations are the unprotected workstations and lack of security for databases. For Luna Sensations to improve their physical security…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Iphone Security Issues

    • 469 Words
    • 2 Pages

    Information breaks, hacking and device thievery is a standard piece of cutting edge life. So as to protect clients, Apple and Google added extremely viable security components to their phone working frameworks making them effectively unlockable. However, the FBI wants Apple to diminish advancements it has made on encryption programming, contending this is making it less demanding for fear based oppressors and different unsafe people to dodge identification. It requested that Apple makes an "indirect…

    • 469 Words
    • 2 Pages
    Good Essays
  • Good Essays

    CCJS 345 Cotemporary Security Issues 2/19/2014 Cyber security has been slowly taking over as the main concern for security professionals as well as organizations. This is due to a larger emphasis on using paperless methods in order to keep track of customer’s data, financial records as well as many other important documents. Without properly trained IT professionals as well as an increase in maintaining up to date security these attacks will continue to have…

    • 649 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Running head: WEB SECUIRTY ISSUES AND CONCERNS CMGT 440 - Introduction to Information Systems Security University of Phoenix Abstract Introduction Riordan manufacturing is a plastic injection molding company based in San Jose. The company also has various operations in 3 other Michigan cities as well as one overseas office in China. “Riordan has a 46 million annual earning” and their major customers are automotive parts manufacturers, aircraft manufacturers, the Department of…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Computer Security Issues

    • 1058 Words
    • 31 Pages

    Security of Computer Network System Abstract: This paper discussed the secure and dependable problem about the computer network system. On some aspects: the importance of network security, basic theory, function, and the method of solving a problem, etc. Good views for solving the problem are put forward. It strengthens people’s consciousness on network security. Key words: Computer network Virtual private network Encryption techniques Firewall Introduction: Along with the computer…

    • 1058 Words
    • 31 Pages
    Better Essays
  • Good Essays

    WALMART SECURITY ISSUES

    • 947 Words
    • 5 Pages

    must be seen as referring to the plaintiff and must have caused harm. 4. Damage the statement must be proved to have damaged and caused harm to the personality interest of the plaintiff B. Types of actio iniuriarum 1. invasion of bodily security (assault) 2. detention or invasion of dignity 3. invasion of privacy e.g: publication of private facts placing a person in a false light unauthorized appropriation of a person’s name or likeness intrusion into a person’s sphere e.g spying or…

    • 947 Words
    • 5 Pages
    Good Essays