Free

Week 2 - Assignment Example

Comments (0) Cite this document
Summary
It is a fundamental requirement that everyone gets to understand the risks associated with information flaws, so as to make informed decisions on how to secure information. With the advancement of technology, there has been encroachment into private information through various…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful
Week 2
Read TextPreview

Extract of sample "Week 2"

Computer Sciences and Information Technology al Affiliation It is a fundamental requirement that everyone gets to understand the risks associated with information flaws, so as to make informed decisions on how to secure information. With the advancement of technology, there has been encroachment into private information through various forms of cybercrime. Several organisations have fought to get to mitigate this vice through various measures. Many systems have been developed but still the ordeal is critical. In this essay, there is a sample case study of a company security system, furthermore there are two articles namely “A Stuxnet Future? Yes, Offensive Cyber-Warfare is Already Here and Thinking Again: Cyber War”. These articles have information about cybercrime and its related offences and outcomes. The essay as a whole provides an in depth look into the issue of cybercrime. Through a company case study, the essay affirms the need for a proper and functional intrusion system to be used to mitigate cybercrimes.
Keywords: information, technology, cybercrime, intrusion
Security Flaws
Regions which require high security are those with valuable items, potentially dangerous materials, and information. The ease of intrusion depends on the security system used. It is essential that the system implemented meets the intended function. The system’s function should be carefully monitored to understand its weakness and strengths. The understudy company uses the security guards at the entrance, but once someone is within the building, he or she is free to roam around. Although there are cameras and motion sensors, they are deactivated during the day and are less in numbers. During installation of these security items, distribution was not taken into consideration. The weakness therefore is the deactivation and distribution. Furthermore, the company lacks an offsite monitoring; this offers an opportunity to an intruder to access a restricted area and escape before being noticed. Craighead suggests that “in the case of offsite monitoring, once notified of an intrusion alarm, the central station staff will either notify security staff at the building” (2009, p. 310).
Intrusion Mitigation
Insecurity over the secured places is often critical. Aside from the presence of security personnel, the most appropriate additional system is the use of technology. An intrusion system is quite an effective security solution. Intrusion systems offer security alerts to security guards and other responsible individuals. The intrusion alert systems incorporate infrastructure that provides adequate security requirements. According to Barnard, “a physical security system consists of four equally important interacting functions: delay, detect, alert and respond” (1988, p. 1). The whole complete system is worthy of adequate security.
Cyber warfare
Information revolution mirrors the advancement of computerized information and growth in communication technologies. Arguments show that information is turning into a strategic resource that is valuable and has great influence in the current industrial age (Arquilla & Ronfledt, n.d.). History has shown that military doctrines have continually passed through changes rallied behind technological evolvement; with this growth, crime has also found its way into the greater use of technology so as to match the advancing security technologies. To this height, it has seen this competition move to cyber space and its related networking’s. According to Andress and Jason, cybercrime has been defined as a “notional environment in which digitalized information is being communicated over computer networks” (2013, p. 3).
There are two given articles narrating about cybercrime: A Stuxnet Future? Yes, Offensive Cyber-Warfare is Already Here and Thinking Again: Cyber War. The explanations of the two articles are intensive, reflecting the extent and potentiality of cyber crime. However, I find it that “Thinking Again: Cyber War” an article by Rid has arguably brought out what cybercrime entails as compared to “A Stuxnet Future? Yes, Offensive Cyber-Warfare is Already Here” (2012) which in itself, has argued that actors can cause cyber damage even without an internet connection.
Further reasons prompting my suggestion that the article by Rid (2012) has deeply dealt with cybercrime is its constant use of appropriate examples, case citation is Estonia ordeal. As explained in the month of April 2007, the well networked country was a victim of intrusion; it had several of its websites attacked including the online banking services. As for Stuxnet crime, Rid (2012) has extensively explained it putting it in the context of cyber criminality; the article explains that “all the functionality required to sabotage a system was embedded directly in the Stuxnet executable” (n.p.).
Reference List
Andress, J. & Winterfeld, S. (2013). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Waltham, MA: Elsevier.
Arquilla, J. & Ronfeldt, D. (n.d.). Cyber is Coming. Rand. Retrieved from http://www.rand.org/content/dam/rand/pubs/monograph_reports/MR880/MR880.ch2.pdf.
“A Stuxnet Future? Yes, Offensive Cyber-Warfare is Already Here”. (2012, October 23). ISN ETH Zuric.h. Retrieved from http://www.isn.ethz.ch/Digital-Library/Articles/Special-Feature/Detail/?lng=en&id=154095&contextid774=154095&contextid775=154091&tabid=1453372088.
Barnard, Robert L. (1988). Intrusion Detection Systems. Houston: Gulf Professional Publishing.
Craighead, G. (2009). High-Rise Security and Fire Life safety. Oxford: Butterworth- Heinemann.
Rid, T. “Thinking Again: Cyber War”. (2012, February 27). Foreign Policy. Foreign Policy. Retreived from http://www.foreignpolicy.com/articles/2012/02/27/cyberwar. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Week 2 Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Week 2 Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1652926-week-2
(Week 2 Assignment Example | Topics and Well Written Essays - 500 Words)
Week 2 Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1652926-week-2.
“Week 2 Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1652926-week-2.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Week 2

Week 2

...WEEK 2 There are three main kinds of data included within an epidemiological assessment. These factors are genetics, behavior, and environment. Genetics helps to establish the health problems facing a certain target population. The environment helps the researcher determine as to whether ones surroundings may cause harm to their health. Behavior helps to set a basis for program priorities among different health problems. 2. The first phase found in MATCH is Educational and Ecological Assessment. The second phase is the Administrative and Policy Assessment and Intervention Alignment. If I were given the task of developing a nutrition information board at a corporate fitness center, first...
1 Pages(250 words)Essay

Week 2

...College: Assignment Question Grid computing plays a critical role in the technological environment, since it facilitates various beneficial activities for an organization. Virgin mobile needs to implement grid computing, for it improves and enhances the collaboration of virtual organizations. In addition, it enhances data sharing and access in the organization; thus, it promotes organizational cohesion. Grid computing will enable the Virgin mobile company to exercise flexibility, because the organization can function effectively without the establishment of offices in each region of operation. (Lightstone, Teorey, and Ladeau 120). Question 2 Enterprise architecture depicts the manner in which an organization will...
1 Pages(250 words)Assignment

Week 2

...Week 2 Week 2 In health care, an organization-wide performance improvement system is quite efficient and effective (U.S Departmentof Health & Human Services, 2009). Therefore, health care centers should develop and maintain a culture for outcomes oriented care within the department. For example, a clinical decision support system is considered as one of the most effective systems which enhance health care. This clinical decision support system ensures that the hospital staff members, patients and other individuals are equipped with the knowledge to provide proper health care services. This performance management plan in healthcare is efficient in gauging the organization...
2 Pages(500 words)Essay

Week-2

... Communication: Mediums of Communication: There are two ways in which an individual can communicate his message,namely; 1. Physical media. 2. Mechanical media. The physical media refers to a channel where by a communicator conveys his message to a large audience, and it is a one way method of communication (Rai et al, 9). This method is used while dealing with important messages that concern a wide variety of people such as a change in the policy of an organization, or even downsizing. This methodology is used by people in charge of large organizations. The channels of this media are large organizational meetings, and video conferences. Organizing a large meeting is important when passing important, and strategic information... Communication...
1 Pages(250 words)Essay

Week 2

...The Art of Noble War through Literature; Lesson Plan: 14 Lesson Grade Level: 3rd grade Allocated Time: one hour a day for one week Content Area(s) Addressed: interaction between children and adults and what society expects of them Setting: a theatre hall or a hall that is larger than the ordinary classroom. This will allow for brief demonstrations by the students and the instructor from the selected texts. Topic: Young Oliver Twist Lesson Standards: these will be in tune with provisions endorsed by the Florida department of education. The main provisions considered are professionalism...
2 Pages(500 words)Essay

Week 2

...Week 2 Week 2 Vendors that filter employee use of the internet and their primary features As the advancement of technology specifically with regards to information technology and communication, various challenges that were not there in the past during the analogue age are presenting themselves. Such challenges are especially as a result of the revolutionary high technological aspects of the internet and networking. A good example of such challenges is hacking of an organization information and technology infrastructure (Amoroso 2007). As a result, companies that specialize in offering protective products from such challenges have come up. A good example is the Clearswift...
2 Pages(500 words)Essay

Week #2

... Week #2 I have learned that it is good to be independent, as it gives people the space to flourish and implement their ideas and plans without necessarily having to limit their abilities to other people’s expectations. I have also learned that independence cultivates a new way of thinking in people, helping them to drift away from retrogressive mindsets to a more dynamic and self-conscious mentality. For instance, we are told on page 126 that one of the main products of Lance Clippinger’s independence is versatility. This allows him to grab opportunities quickly as they come. This shows that independence is really an asset when used well. Another thing I have learnt is that if you believe in a value a cause you have to stand... Week #2 I...
1 Pages(250 words)Article

Week 2

...Risk Management What kinds of projects need risk attention? How does risk management differ on different sizes and types of projects? In every projects need some level of risk consideration theres continually something that could happen, regardless of how little the project. What decides the profundity and degree of the exertion is this: how enormous is the extension and unpredictability of the project, and what is known and obscure in that scene? The scale and multifaceted nature matter in light of the fact that by definition they build the chance for questions. The scaling of risk appraisal and risk alleviation planning must be relying upon intricacy, size and sorts of project. Along these lines, all projects will have risks... Management...
2 Pages(500 words)Research Paper

Week 2

...Week 2 Assignment al Affiliation Week 2 Assignment Section The purpose of the critical appraisal is to determine the validity of the source, to determine its relevance to the topic of concern and to combat information overload. A critical appraisal is generally important in selecting sources for a research exercise. A critical appraisal is a systematic procedure. In this process, I will formulate questions that will assess the validity and the relevance of the articles. These questions would touch on relevance of the study question, new information in the article, type of research question, the study design, the study methods used and whether the data collected justify...
3 Pages(750 words)Essay

Week 2

...WEEK 2 Human actions are guided by specific laid down rules and regulations. Besides, unwritten of conduct forms part of human behavior during any socialization process. Ethical standards have always been considered central in defining the actions of people. The question that arises is whether to take up ethical relativism or absolutism. Although proponents of ethical absolutism asserts the need to pursue only the right thing regardless of the circumstance, real life experience seems to question this. The welfare of humanity forms the basis of ethical conduct and seems to override the general perception of the society (Finser, 2003). In this regard, comparative analysis of existing circumstance may influence the decision... 2 Human actions ...
1 Pages(250 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Week 2 for FREE!

Contact Us