StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Threats and Defenses - Essay Example

Cite this document
Summary
The term social security in the context of organization is defined as the act in which, employees of an organization are manipulated by outsiders to rely key and confidential information details regarding an organization (Hadnagy, 2011). This information is sort by ill…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.8% of users find it useful
Security Threats and Defenses
Read Text Preview

Extract of sample "Security Threats and Defenses"

Security threats and defenses Role of information system security The term social security in the context of organization is defined as the act in which, employees of an organization are manipulated by outsiders to rely key and confidential information details regarding an organization (Hadnagy, 2011). This information is sort by ill intentioned people for purposes of hacking computer systems or committing fraud. Social engineering is the newest form of crime in organizations and involves manipulation of the mind in hidden ways (Hadnagy, 2011).

The successful operation of any organization is highly dependent on the performance of its work force. It is therefore the responsibility of any success oriented organization to enlighten its employees on the underlying security threat. An ethical, well goal oriented team is always desired. Information security is a major concern to all organizations. It ought to be part of every organization’s internal controls and operations. These controls ought to be internalized in a way that the employees are made to realize that violation of security puts them at a greater risk.

These services to make employees feel their loyalty is crucial to the success of the business. In addition, information security need be given priority and adopted as a distinct value in any institutional culture governing staff behavior. It is therefore necessary to review security policies by offering training forums to employees. Another way of promoting security is by way of regularly reviewing security guidelines to ensure they are relevant an in line with the expected performance. Communication between the management and the employees ought to be health for security purposes.

This aids in that employees can report underlying identified security threats before they occur. Healthy communication patterns not only boost security, but also save the company from incurring unnecessary costs arising from security compromises.Social engineering techniques Fraudsters have devised many forms of interfering with the security systems of organizations. For instance, there has been intensive use of ignorance of controls by employees. This occurs in organizations where employees think some process are long and bureaucratic and hence, want a quick way out of it.

Ignorance is no defense as it compromises the security of an organization (Hadnagy, 2011). It also occurs where employees are not well briefed on internal controls and information security patterns of an organization. Proper security training need to be impacted on the employees to avoid embarrassment when sensitive and confidential information is leaked to third parties Another form of social engineering is deliberate efforts to subvert controls of company information. From time to time, a company requires wholly entrust responsibilities to employees.

In such a case the technical department will not be in a position to protect the company for fraudsters (Hadnagy, 2011). Therefore, it the employee cannot be trusted to maintain secrecy, he or she could trade crucial information for selfish gains. They could also get manipulated. It is of great need that employees are trustworthy with or without supervision. The other aspect of social security engineering is in the form of conformity (Hadnagy, 2011). Conformity entails the ill-motive individual trying to convince an employee to confirm a password or log in information for him on the pretext that someone else such as the supervisor had already done it and he is merely confirming.

This can be avoided by establishing proper communication channels within an organization so that such compromises are not made. A company can further discourage such security threats by installing tracking systems in which workers compromising the security of a company are detected and severe actions taken against them.ReferencesHadnagy, C. (2011). Social engineering: The art of human hacking. Indianapolis, IN: Wiley.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Threats and Defenses Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Security Threats and Defenses Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1620918-security-threats-and-defenses
(Security Threats and Defenses Essay Example | Topics and Well Written Essays - 500 Words)
Security Threats and Defenses Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1620918-security-threats-and-defenses.
“Security Threats and Defenses Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1620918-security-threats-and-defenses.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Threats and Defenses

Advanced Persistent Threats against RSA Tokens

 The information security management team requires authentic and on-time information for constantly monitoring new and potential threats and techniques.... The paper ''Advanced Persistent threats against RSA Tokens'' tells that Today, where every technology interrelated to Information technology involves the '.... Likewise, a new class of challengers called now 'Advanced Persistent threats (APT) demonstrates a well-planned and sponsored, highly skilled hackers targeting highly classified data for gaining competitive edge specifically incorporate businesses, law firms, military networks, national or international politics (Cole, 2012)....
5 Pages (1250 words) Essay

Advanced Persistent Threats Against RSA Tokens

Moreover, the net-centric ATM connectivity raises concerns for cyber security threats and vulnerabilities.... Information security management team requires authentic and on time information for constantly monitoring new and potential threats and techniques.... These mobilized resources were aligned to counter apparent cyber threats from terrorist attacks.... Propagation threats are critical because it is capable of rapidly broadcasting traffic on the Internet along with bypassing intrusion detection systems....
5 Pages (1250 words) Case Study

Security Recommendations After Security Breach

Since the network plan scope is limited by the form of threats it covers, often, IT related threats may have a separate IT plan is prepared using specialized knowledge.... With the network components to be defended, the next move is the determination of threats to be defended (Sighn, 2011, p.... However, the huge costs involved go not mean taking chances with business network security especially given the rapidly expanding networks both commercially and… With these and other factors, security issue gains top priority for all companies where information technology use is inevitable....
4 Pages (1000 words) Assignment

Proposing a Solution

is at a heightened level of cyber threats considering the milestones it has made in the telecommunications and technological fields.... At the helm of the escalating risks to the national security in the country, the cyber environment threats are equally evolving, as... Therefore, it is essential to establish workable approaches to maintaining the security of the communication and technological systems.... The advent of the security challenges created another aspect of terror, an establishment that many nations are yet to consider as a possible channel for terror attacks....
6 Pages (1500 words) Essay

The US Cyberspace - Emerging Threats

 The nations that oppose America have started targeting their systems by means of cyber threats and attacks.... The present discourse elaborates emerging threats for the US cyberspace.... Since cyber threats pose a high risk to a country's security, the country must incorporate efficient and effective tools to maintain its security.... They aim at attacking the security system by creating threats that result in problems like system crash and data loss....
5 Pages (1250 words) Research Paper

Smartphones and the Security of the Data in Them

hellip; With the information gathered regarding multiple security threats that are currently present and looming today, we can say that there is a significant issue regarding smartphones and the security of the data.... It is our natural response to build a defense for any threat that we encounter and develop these defenses according to developing threats.... This paper recognizes that there are lots of threats that can and will try to attack your device and aim for your information....
7 Pages (1750 words) Term Paper

Global Threats to the US National Security

This article will address the current nature of threats and the major priorities that the National Security Council should deal with them effectively.... This term paper "Global threats to the US National Security" presents threats to the National Security Council, that affect the world population at large.... The world has seen threats to security that are brought about because groups of people have prioritized personal interests....
2 Pages (500 words) Term Paper

Australia Defense Policy

This can be basically explained by the increasing global security issues such as threats from terrorism as well as the associated fear of mass destruction falling into the hands of terrorists which are posing serious security challenges.... hellip; Australia's current position on security and defense, therefore, continues to be based on the principle of self-sufficiency in direct defense of Australia as well as in relation to its unique strategic interests, although with the capacity to do more when necessary and consistent with the strategic interests that it might be sharing with others, and within the limits of its resources....
6 Pages (1500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us