Nobody downloaded yet

Systems Security/Ethical Hacking - Essay Example

Comments (0) Cite this document
Contents Contents 1 Part A 3 1.1 Introduction 3 1.2 Overview 4 1.3 Scope 4 1.4 Gold Star Goals and Objectives 5 1.5 Purpose of Establishing Policy 5 1.5.1 Success Factors 6 1.6 Application of the Policy 7 2 Computer Hardware and Software Policy 7 2.1 Ownership 7 3 Acceptable Use Policy 10 3.1 Network Security Policy 11 4 Legislation and Other Policy 12 4.1 Associated and Applicable Legislation 12 4.2 Intellectual Property Rights 13 4.3 Intellectual Property Standards and Training 13 4.4 Using Software from Outside Sources 13 5 Enforcement 14 6 Revision History 14 7 Definition of Terms used in this policy 14 8 Easy Access Matrix 15 9 Passwords policy 15 10 Privileges policy 16 11 Email Use Pol…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful
Systems Security/Ethical Hacking
Read TextPreview

Extract of sample "Systems Security/Ethical Hacking"

Download file to see previous pages Organizations are dependent on these digital communication channels for transferring and exchanging classified information such as confidential information, mission critical information and information that is published for the people. As information is a blood life of any organization, it is vital to protect information by implementing physical, logical and environmental controls. In the context of protecting information security, three fundamental factors must be considered to make use of digitized information in an effective manner i.e. Confidentiality, Integrity and Availability. As there is a requirement of protecting this digital information internally and externally, policy is a control that provides necessary steps, procedures and processes to protect information. These are also considered as high level statements derived from the board of the organization. “Information security policy is therefore considered an essential tool for information security management” (Ilvonen 2009). However, information security policy is customized by company to company and department to department. Different factor that may influence to tailor the policy includes organization size, dependence on information systems, regulatory compliance and information classification scheme. For addressing all issues related to information security via a single policy is not possible, however, to cover all aspects related to information security, a set of information security policy document focusing on different group of employees within the organization is more suitable. This paper will discuss different factors that must be taken in to account when constructing and maintaining an information security policy. However, there are many methods available for constructing an information security policy, the initial step before adopting any one of the methods is to identify the current maturity level of the policy construction process within the organization. The outputs will be either no information security policy development process in place or there is an extensive policy development process exists. 1.2 Overview As information security (Detmar Straub, Goodman et al. 2008) has now become everyone’s business, every employee of Gold Star is accountable making themselves aware with the compliance with Gold Star policies, procedures and standards associated with information security. Likewise, a policy is considered as a tactical control followed by budgets and organizations (Osborne, Summitt, n.d). Information Security is defined as: “The protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats” (Vacca, n.d ). Information security has three fundamental objectives that must be met i.e. Confidentiality, Integrity and Availability. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Systems Security/Ethical Hacking Essay Example | Topics and Well Written Essays - 3000 words”, n.d.)
Systems Security/Ethical Hacking Essay Example | Topics and Well Written Essays - 3000 words. Retrieved from
(Systems Security/Ethical Hacking Essay Example | Topics and Well Written Essays - 3000 Words)
Systems Security/Ethical Hacking Essay Example | Topics and Well Written Essays - 3000 Words.
“Systems Security/Ethical Hacking Essay Example | Topics and Well Written Essays - 3000 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Systems Security/Ethical Hacking

Ethical Hacking

...Ethical Hacking 1. Threats There have been many cyber attacks in the past that have weighed heavily on the shoulders of the victims. Three of the many examples are described here. Black Hat Crackers worked to take advantage of computer systems, and Jonathan James has been a big name among black hat crackers. He was sentenced at the age of sixteen and told the press that all he did was for fun. One instance of his great hacking is installing a backdoor into a Defense Threat Reduction Agency server and hacking sensitive information and employees’ data. In June 2005, the computer specialist, Michael Haephrati and his wife Ruth, who belonged to London,...
5 Pages(1250 words)Research Paper

Ethical hacking

.... I’ve always been interested in hacking, and as someone who one day hopes to be a white-hat or grey-hat hacker, this was a lab that I was looking forward to—especially learning the challenge of how to footprint being absolutely essential to my success as a future hacker. White-hat hackers generally hack for good causes. Grey-hat hackers usually hack due to purposes that are neither beneficial nor harmful to an organization which is hacked. Learning how to become a hacker is integral to my future goals, and learning how to footprint just did that—by learning how to hack a system ethically, without having a denial of...
8 Pages(2000 words)Coursework

Ethical Hacking Final Challenges

...? ETHICAL HACKING Challenge The MD5 selected by the CA as the hashing algorithm for creating digital signatures has its own vulnerabilities. First, MD5 is unsecure given that it does not posses the ability of generating unique identifiers of a fixed size with the ability of blocking data of arbitrary size. A secure hash algorithm must posses the ability of the unlikely of producing two different inputs to the algorithm of generating the same digest. The moment in which an algorithm is able to produce the same digest for two different blocks of data otherwise referred to as collision resistance. Therefore one of the vulnerabilities of MD5 is its possibility of resulting into collision...
4 Pages(1000 words)Research Paper

Ethical Hacking

...? Ethical Hacking Ethical issues have been raised concerning the use of hackers to secure the network systems of companies, from other hackers with malicious intent. Some have argued that the ethical issues concerned are not related to the hacking itself but vary according to what the different members of the society may think. It is a situation where ethics are judged, not by the universal definitions concerning hacking, but according to the society within which the use of ethical hackers has become commonplace. Introduction Ethical...
5 Pages(1250 words)Research Paper

Ethical Hacking

...ETHICAL HACKING Ethical Hacking According to Raymond, the term 'Hacker' has a dual usage in the computer world. Originally, the term was defined as: HACKER noun 1.A person who enjoys learning the details of computer systems and how to stretch their capabilities-as opposed to most users of computers, who prefer to learn only the minimum amount necessary. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming (Raymond, 1991). From the above definition it is clear that, the original idea behind hacking has nothing malicious in its intent. According to me hacking is...
2 Pages(500 words)Essay

Social Engineering (ethical hacking ) information systems security on the internet. In this regard, internet has resulted in commencement of various beneficial things such as electronic commerce, e-mail, e-advertisement, and e-education; however, along with such technological advancements, there is one major issue among the various IS security related issues; hacking (McClure & Shah, pp. 20-26). In other words, a huge number of issues and threats exist in the world of information systems; however, hacking is one of the major issues that have been deteriorating the security of information security systems, which will be...
8 Pages(2000 words)Essay

Ethical Hacking

...Scanning and enumeration tools 4 September Scanning and Enumeration Scanning and enumeration compose the second pre-attackphase, the active part of gathering information about the target. Scanning is the deliberate process of trying to access the systems to get a response, while enumeration collects additional in-depth information to ensure the success of attack (The Ethical Hacker Network, 2012). Intrusion Detection System An Intrusion Detection System (IDS) is a system that oversees network traffic or host audit logs to recognize violations in system security (Information Assurance Technology Analysis Center (IATAC),...
2 Pages(500 words)Essay

Ethical Systems

...ETHICAL SYSTEMS Ethical Systems The ability to act as ‘one ought to act’ rather than as ‘one feels comfortable’ is the foundation of ethical formalism. Every once in a while we are confronted with an ethical dilemma, the ethical resolution of the dilemma lies in identifying the relevant facts, identifying the relevant values and concepts, recognizing all possible moral dilemmas for each party involved, deciding what is the most immediate moral or ethical issue facing the individual and finally and most importantly, resolving the ethical or moral dilemma by using an...
2 Pages(500 words)Essay

Ethical hacking utilize their frameworks as switches. We anticipated this might give an open door to utilize the FORWARD chain as a part of later use with iptables. Extra directing knowledge was given by a virtual system Iptables was added to the data security course on the second cycle in 2007. We have progressively been enhancing the documentation for iptables so scholars might not crush their own (remote) get to by inappropriate setup or by flushing principles (holding their just Accepts) once again to DROP arrangements. As of now we are creating the instructional materials for Ftester so scholars can hone firewall testing. The virtual machine are intended to be insignificant but sufficient for...
8 Pages(2000 words)Essay

Ethical v. unethical hacking

...administrators would deny computers users access to systems once they found out that they could cause damage or had malicious intentions. The media soon discovered the many intrusions and the extent of damage malicious users made in computer systems. Recreation and intrusion practices became “news” as the media picked up events and stories about them. The media then popularized the computer criminals as “hackers” and computer intruders and crackers today are still named similarly (Palmer, 2001). Ethical Hacking The Internet has become ubiquitous making computer security a major concern for governments and organizations. Organizations and individuals...
10 Pages(2500 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Systems Security/Ethical Hacking for FREE!

Contact Us