StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Security and Information Security - Assignment Example

Cite this document
Summary
Using a web search engine, the author of the following paper "Cyber Security and Information Security" explores an article that reports on the relative risk that comes from inside the organization as opposed to risk that comes from external sources. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
Cyber Security and Information Security
Read Text Preview

Extract of sample "Cyber Security and Information Security"

?Textbook: Management of Information Security by Whitman and Mattord Chapter 2 P. 70 Using a web search engine, find an article from a reputable source published within the past six months that reports on the relative risk that comes from inside the organization as opposed to risk that comes from external sources. If the article notes that this relative risk is changing and to what does the article attribute the change? Phneah (2013) reports on how organizational risk coming from inside sources is currently evolving and insiders that pose a risk are working in different and more complex ways. For example, Phneah (2013) suggests that previously, risks from inside the company were previously more about financial shifts, but now corporate espionage is becoming a bigger risk. This may be because the benefits that come from understanding the organizational structure and what the company is working on may be extremely beneficial to some individuals, and there are those that are willing to pay more to understand how the company works. The article does note that the relative risk is changing, because Phneah (2013) suggests that insider risk may actually become more important from the dangers from outside the organization. Another interesting thing to consider is that there may be a risk from collaboration between insiders and outsiders, which could pose a significant risk to information security. The risk is noted to be changing because organized crime groups understand that they can cause a lot of damage (for financial game or types of terrorism) by using insiders to promote the attacks. The change may also be due to the fact that many corporations are aware of the risk from outside the company, and thus information security has been tightened up in the last decade making it very difficult for outsiders to attack without relevant passwords or passkeys. The collaboration therefore combines someone who already has access with someone who wants to commit serious attacks. Phneah, E. (2013, August). Insider threats evolving, still main risk | ZDNet. ZDNet. Retrieved August 30, 2013, from http://www.zdnet.com/insider-threats-evolving-still-main-risk-7000003491/ 2. Search your institution’s published documents, including its Web pages. Locate its mission statement, vision statement, and strategic goals. Identify any references to information security. Also look for any planning documents related to information security. From the website, UMUC has the mission statement to provide good-quality, affordable and accessible education as part of the state of Maryland. The vision statement suggests that it aims to be a part of the greater movement to allow more people to get a college degree regardless of their circumstances, although this is not stated explicitly on the website. The strategic goals of the institution are to achieve the mission and vision by providing a lot of online courses and having campuses in many locations. This increases accessibility. Additionally, there are several references to financial aid which can be given as a way of helping more people attend UMUC. There are not that many references to information security, but the website does have a secure sign-in area for students and faculty designed to keep important information secure and personal to the individual. Chapter 3 P.114 4. Using the format provided in the text, design an incident response plan for your home computer. Include actions to be taken if each of the following events occur: Virus attack Power failure Fire Burst water pipe ISP failure What other scenarios do you think are important to plan for? Type of Event Virus Attack Potential Damage Files could be corrupted, private and personal information could be taken and used in malicious and criminal ways Precautions Install anti-virus software and keep it updated regularly to prevent against potential attacks Actions to Take Immediately use anti-virus software to identify the type of virus and the damage it could do. Use the software to remove the virus if possible, if not try to remove all personal information from the computer and save necessary files. Reinstall operating system as a last resort. Type of Event Power Failure Potential Damage Damage to the PC itself through electricity surges, may be unable to access information until power is restored Precautions Ensure laptop battery is charged and protect it from power surges Actions to Take Immediately remove PC from wall. If necessary, find a power outlet that works so that the laptop can continue to be used, e.g. coffee shop Type of Event Fire Potential Damage PC destroyed Precautions Keep fire alarms in working order, potentially installing fire doors and other safety precautions Actions to Take The most important thing here is personal safety. Remove yourself from the building and worry about PC damage later. If necessary the laptop can be taken with you when leaving the building to protect it from fire damage, but only if this does not harm the individual Type of Event Burst Water Pipe Potential Damage PC damage or destruction Precautions Keep PC away from water pipes and do not leave on the floor in case of flooding Actions to Take Take laptop away from the water pipe as soon as possible. Do not turn the PC on if it is wet, as this could cause a fire or more damage. The PC can then potentially be dried out at a later stage to remove the information needed, or it may still work. Type of Event ISP failure Potential Damage Unable to access internet Precautions Choose a reliable ISP, know locations where free wi-fi is available Actions to Take If ISP is down, find another area where wi-fi is available if the internet is needed. Use cell phone internet if necessary. It may also be important to plan for theft of my home computer in the event of a burglary. Additionally, there could be accidental damage to the PC which may make it difficult to retrieve information from it, such as screen breakage or power cable issues. 5. Look for information on incident response on your institution’s Web site. Does your institution have a published plan? Identify the areas in an academic institution’s contingency planning that might differ from those of a for-profit institution. UMUC has a very detailed emergency response plan, which is available to download from the homepage. It was quite difficult to find (I went through Google) but there are a number of links on this page that give a lot of information. It may be worthwhile bookmarking this for future reference. An academic institution may be more worried about the loss of research and the safety of staff than the for-profit institution. It will be important to protect books in the case of a fire or water damage, whereas for-profit institutions will be more likely to worry about protecting accounting documents and goods (if relevant). Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber Security and Information Security Assignment”, n.d.)
Cyber Security and Information Security Assignment. Retrieved from https://studentshare.org/information-technology/1485027-cyber-security-and-information-security
(Cyber Security and Information Security Assignment)
Cyber Security and Information Security Assignment. https://studentshare.org/information-technology/1485027-cyber-security-and-information-security.
“Cyber Security and Information Security Assignment”, n.d. https://studentshare.org/information-technology/1485027-cyber-security-and-information-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Security and Information Security

Cyber Security Policy Initiatives

The present paper under the title "cyber security Policy Initiatives" concerns the policy of cyber security.... hellip; The system of technologies, procedure, and observance which are structured for protecting networks, systems, applications and important information from attacks, harm or entrance from unauthorized as well as unrecognized sources is what is known as cyber security.... With the ever evolving cyber world, cyber security is of paramount importance....
11 Pages (2750 words) Research Paper

Cyber Insecurity

cyber security is a term that is often used to represent the kind of protection given to personal information and digital documents.... In his article “Winning the fight against cyber crimes”, Lurrent (2012) argues that he need for cyber security has increased and become timely mainly because of increases of activities of illegal cyber operations.... In his article “Countermeasures for cyber security”, Deritck (2011) clearly states that unless pragmatic steps are taken to give total protection to users of the internet and other information systems against cyber insecurities of all forms, the interest that people have in using technology in advancing communication and commerce will bring down....
2 Pages (500 words) Research Paper

Cyber Security as the Process of Different Security Measures

This essay analyzes that cyber security refers to the process of applying different security measures to foster integrity, confidentiality, and accessibility of data.... cyber security ensures the protection of assets of an organization, including servers, data, buildings, humans, and desktops.... cyber security is a global concern because cyberspace is increasingly becoming a crucial asset to nations.... cyber security is a global concern because cyberspace is increasingly becoming a crucial asset to nations....
6 Pages (1500 words) Essay

The Role of Information Security

According to the committee on National Security System, information security is defined as the protection of information and its critical elements, including the system and hardware that use, store, and transit that information.... It includes the broad areas of information security management, computer, data, and network security (Whitman & Mattord, 2012).... Hence there is development of a more robust model of information security that addresses this threats ,the model consist of critical characteristics of information :availability,accuracy,authenticity , possession, integrity ,utility and confidentiality....
4 Pages (1000 words) Thesis

Chief Security Officer

In essence, before establishing an enterprise or an institution, it is necessary to ensure that effective security mechanisms are put in place.... The problem of insecurity has been very controversial in… The diversity of the education system and the increased use of the modern technology facilities in education has resulted in numerous security threats.... Among the most dangerous security concerns that have emerged as a Computer crime cab be described as any unlawful activity involving a combination of a network and a computer....
8 Pages (2000 words) Assignment

Cyber Security, Imperfect Information Stochastic Game

The paper "cyber security, Imperfect Information Stochastic Game" states that there are dynamic games, which have curtailed and faulty information regarding the attacker.... hellip; Current approaches of game-theoretic security are based on games with perfect information, static game models, or games having absolute information (Liu, Comaniciu, & Man, 2006; Alpcan & Pavel, 2009; Nguyen, Alpcan, & Basar 2009).... Moreover, there are current models that involve dynamic game having curtailed and defective information....
6 Pages (1500 words) Literature review

Role of Computer and Information Security in Defining Current National Security Issues

"Role of Computer and information security in Defining Current National Security Issues" paper states that the use of computers and information availability has highly resulted in many national insecurity issues in many countries, hence affecting most of these countries economically and socially.... The present paper purports to highlight the role of computers and information in defining national security issues.... Indeed, the advancement of computers and information available via the internet enhanced and shaped the national security strategies in the United States (ODay, 2005)....
8 Pages (2000 words) Coursework

Information Technology Security

This coursework "Information Technology security" describes different types of attacks and the main aspects of security.... The discussion that follows will outline some of the challenges of information technology security.... nbsp;… However, the emerging information insecurity in organizations can be a drawback in many ways.... Criminal justice has had to catch up and develop crimes and sanctions based on the usage of information communication technology....
7 Pages (1750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us