StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Evaluation of Data and System Security - Coursework Example

Cite this document
Summary
Classically, computer security has been about systems of prevention. This is the most desirable form of safety, the one specific to computation, and the one that most admits progress by formal reasoning…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Evaluation of Data and System Security
Read Text Preview

Extract of sample "Evaluation of Data and System Security"

Download file to see previous pages

The difficulty in getting this right depends upon the company and its products, if it manufactures then there is an added problem building security into its Information Technology and Telecoms (IT & T) structure on the shop floor which is not present if it is something like a bank or college which has a whole set of differing demands on security and who and where to watch for major attacks. Key words: security, networks, PC Humans in the Loop Like so many areas of IT, security would be invincible if it were not for letting people use the systems and applications, sadly this has to happen and so systems get corrupted, hacked and generally brought to their knees.

Both by users and external attacks by hackers, etc. Security has been stepped up over many years as better understanding of where problems can come from and what must be done to stop them. But, now very often the very security is itself the biggest problem as it gets in the way of productive work and can cause major problems for IT personnel trying to control users and still give them sufficient mobility to do their job well. Problems come from areas such as giving someone permissions to do a task on a mission critical application, the person goes on holiday and gives another person in the department the passwords to get into the application, that person is not well trained and promptly crashes the system on Monday morning, what then?

The holidayer and substitute person will be punished then they say “oh well its impossible to get permissions for something as short as a week off, but the reports have to be done” what should managers think, it has been done for the best of motives, but the outcome is a disaster for the company security systems and for productivity. Making staff aware there can be bad outcomes is all very well, but if they find they cannot work well then human nature says find a way around the problem system or process as it’s no good.

The other way will be for staff to say well we cannot do it because of the system and then productivity takes a tumble. Managers are left swearing at the whole mess, which has an apparently impossible set of outcomes. Security officers in various companies have tried some very harsh tactics to ensure they get rid of the bad guys, Carol Dibattiste states that as security officer in ChoicePoint where it had been attacked by a Nigerian person by the name of Olatunji Oluwatosin, who had posed as a legitimate set of enterprises and he was then able to set up 50 bogus accounts and got hold of ChoicePoints’ customers personal data, including names, addresses and social security numbers.

When he was arrested he had to pay back $6.5 million in restitution. The problems for ChoicePoint had barely begun though, as the customers had no confidence and disappeared in droves. It was only when the company could show how well it had beefed up security that customers started to return. It now has a very harsh security system but feels that is better than being lax. But is it being to harsh, according to reports it will now check existing customers and if it finds something it feels is questionable even though the customer has already been through rigorous vetting it will cut them off, human nature though shows that things can get away from a small, busy company.

So maybe a little to harsh today? There are measures that must be taken and then there are those that

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Evaluation of Data and System Security Coursework”, n.d.)
Retrieved from https://studentshare.org/information-technology/1430221-data-and-system-security-case
(Evaluation of Data and System Security Coursework)
https://studentshare.org/information-technology/1430221-data-and-system-security-case.
“Evaluation of Data and System Security Coursework”, n.d. https://studentshare.org/information-technology/1430221-data-and-system-security-case.
  • Cited: 0 times

CHECK THESE SAMPLES OF Evaluation of Data and System Security

Information Security Program Development

hellip; Teams can be developed from separate functions of the organization that can judge the data and sees what kind of security is required according to the expertise and technologies available.... Initially, this company was using very old fashioned methods of securing its important information such as corporate data and consumer data.... This paper "Information security Program Development" discusses information itself as an asset most important to an organization....
9 Pages (2250 words) Case Study

Evidence-Based Techniques for Evaluating Cyber Protection Systems for Critical Infrastructures

The methods proposed in this research apply a somewhat unique group of security technology primitives, involving system management primitives, monitoring, access control, authentication, data-aging protection, integrity checking, and encryption.... The actions required to improve the effectiveness and security of critical infrastructures are primarily in the model of defense against malevolent attacks.... A quantitative technique for assessing Cyber Protection system (CPS) was required for the combined assessment of the usefulness of the CPS and Physical Protection system....
1 Pages (250 words) Essay

Trusted Computer System Evaluation Criteria for Nessus vs Wireshark

Network security professionals of a large enterprise can customize plugins, as per their requirements, as the tool has its own scripting language for defining methods to test and identify network for vulnerabilities (Kim, n.... The tool will penetrate within the corporate network and start scanning anonymous File Transfer Protocol (FTP) and for the client/server architecture, secure socket Layer (SSL) will provide an additional layer of security for report results....
5 Pages (1250 words) Essay

A Forensic Investigative Response Approach for Suspected Security Breach

The paper "A Forensic Investigative Response Approach for Suspected security Breach" summarizes that the security advisor should monitor all business systems for any security lapses, document the entire episode of hacking and list the security incidents, educate employees about security awareness.... hellip; Of late, wide-scale cyber-attacks have buttressed that security and safety safeguards of ICT (information and communication technology) in many infrastructures are not adequate as the aimed attacks perused by talented individuals or organizations....
6 Pages (1500 words) Case Study

Improving Security Across The Software Development

Virus corrupt useful information in computer hard drives, Loss of data occurs if the computer hard drives are damaged, back up and recovery programs are best applied.... Therefore, the evaluation of the security status of these network devices is vital.... This report "Improving security Across The Software Development" discusses network security devices, this service helps our organization improve risk management and satisfy compliance requirements by reducing threats to the confidentiality, and availability of business processes and information....
5 Pages (1250 words) Report

Advances in IT and Benefits of System Security

… Activity 13b): Guidelines for the Security Strategy18Activity 13b): Use of the Balanced Scorecard Methodology18Activity 14b): The Security Strategy19Activity 14c): Assimilate feedback and guidance19Activity 14d): User and Data security Activity 13b): Guidelines for the Security Strategy18Activity 13b): Use of the Balanced Scorecard Methodology18Activity 14b): The Security Strategy19Activity 14c): Assimilate feedback and guidance19Activity 14d): User and Data security Hierarchies20Activity 14e): Security data views and access paths20Activity 16b): Appropriate Control Mechanisms21Activity 17a): The current and new Environments with their Controls21Activity 17b): New Procedures for Controlling Security Provisions22Activity 18a): Internal and External Stakeholders' Needs22Activity 18b): Document the Implementation Strategy22Activity 19a): Audit Principles and their relevance to security planning23Activity 19b): Relevant Audit Mechanism23Activity 9c): Response Principles23Activity 9d): Appropriate Response Mechanisms24Activity 20a): Technology Needs24Activity 20b): Constrains in implementing the new technology24Activity 22a): Existing Protection25Activity 23a): Net Protection and Detection Technologies25Activity 24a): Technology Fixes25Activity 25a): Results of the Evaluation Process25Activity 26a): Impact of the results upon the security strategy and the implementation process26Activity 27a): Installation of the Approved Equipment26Activity 28a): Installation of Approved Equipment26Activity 28b): Documentation of Approved Equipment27Activity 29a): Issues to be presented from the Project27Activity 29b): Outcomes27Activity 29c): Learning Unit Summary27References29Activity 1a: BackgroundRapid and spectacular advances seen in Information Technology have offered incredible benefits to the concerns of system security....
17 Pages (4250 words) Assignment

How Is Information Made Secure and Why Is This Necessary

… The paper “Information security – Importance, Internal Dangers, System Administrators, Effective security Configuration” is a fascinating literature review on information technology.... Information security has a very important role in the role of privacy of the data (Brain, 2009).... The field of Information security has developed over the years to now where we have many ways of securing data.... The paper “Information security – Importance, Internal Dangers, System Administrators, Effective security Configuration” is a fascinating literature review on information technology....
7 Pages (1750 words) Literature review

A Security Evaluation of Personal Information Management

The intended security evaluation of personal information management will, therefore, seek to explore the safety of my data and information which is stored in my home computer, smartphone, and personal laptop.... … The paper "A Security evaluation of Personal Information Management " is a worthy example of a term paper on information technology.... The paper "A Security evaluation of Personal Information Management " is a worthy example of a term paper on information technology....
9 Pages (2250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us