StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Entifying Information Assets, Threats, and Vulnerabilities in Top Information Security Breaches of the Decade - Assignment Example

Cite this document
Summary
A security breach or security violation is any occurrence that leads to unauthorized access of data, networks, services, devices, and/or applications by bypassing security mechanisms that exists. Security is breached whenever a person or an application unlawfully enters a…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
Entifying Information Assets, Threats, and Vulnerabilities in Top Information Security Breaches of the Decade
Read Text Preview

Extract of sample "Entifying Information Assets, Threats, and Vulnerabilities in Top Information Security Breaches of the Decade"

INFORMATION SECURITY BREACHES A security breach or security violation is any occurrence that leads to un ized access of data, networks, services, devices, and/or applications by bypassing security mechanisms that exists. Security is breached whenever a person or an application unlawfully enters a confidential, private or logical IT perimeter that is unauthorized (Gupta, et al. 2009). Five of information security breach that occurred in the last decade include are: insider misuse, unauthorized access by insiders, spam, malware, and unauthorized access by outsiders.

Insider misuse that belongs to computing resources takes many forms. If is not resolved, it can lead to very serious information security. The electronic or the physical security systems are not the organization’s weakest security link; human are the one with the weakest links. It is always assumed that the insider threats originate from rogue workers or planted ‘moles’, IT administrators and managers who are privileged to the access of sensitive information, controls and resources poses the greatest risk.

They can start and stop a system, make changes that are critical such as giving the rights to access and untraceably deleting security logs. This threat is devoted to describing the mechanisms used for compromising organizational intellectual property from within (Gupta, et al. 2012). A lot of security incidents are caused by insider misuse i.e. accidental or malicious. A lot of misuse occurs within the boundaries of trust necessary to perform duties. Preventing the misuse is difficult as the only way to stay secure is to grant access rights only to those with business need and to keep an eye on their activities.

The problem is that the majority of organizations have very limited capabilities to trace specific IT events to specific users, with any certainty. A small fraction of IT teams are aware of what is going on in their infrastructure in a particular time and some organizations look manually through files so as to get answers. Unauthorized access by insiders; by accessing the organization’s secured areas physically, or materials that have data which is sensitive make it very easy for a crime to be committed by malicious insiders.

The physical security measures of an organization are as important as the technical security controls. This threat is emerging as a great risk to corporate data. The vulnerability that led to this attacks are; unauthorized access even when credentials are missing, lack of managing the threat of shared password, failing to ensure organization’s critical assets access is attributed to a specific employee, and failing to respond immediately to suspicious access behavior. Spam is e mail message that is unwanted and is highly visible to each and every person in the organization and it serves as a way of many other forms of attacks.

This threat is continuously increasing. The other problem that spam has apart from annoyance is its cheat customers which undermines their confidence and affects the legal internet market that utilizes practices that are ethical (Rainer, et al. 2011). Spam uses the weaknesses of the security so as to remotely install software that are hidden and this changes private PCs to become proxy server or mail. They are routed through servers in the overseas to prevent detection. Malware is an infection to an organization’s network or system by worms, viruses, adware, Trojans or spyware.

In spite the advancement made in technology to prevent malware, it still ranks highly in information security breaches. There distinct difference between organizations in accordance to malicious code attacks frequency, mostly because of their differences in how good organizations defend the security events (Whitman, et al. 2009). Unauthorized access by outsiders simply refers unauthorized use of the system by the outsiders. Hackers have obtained access without the permission of the organization and this has lead to a serious concern of information security breach to organizations.

ReferencesGupta, M., & Sharman, R. (2009). Handbook of research on social and organizational liabilities in information security. Hershey, PA: Information Science Reference.Gupta, M., Walp, J., & Sharman, R. (2012). Threats, countermeasures, and advances in applied information security. Hershey, PA: Information Science Reference.Rainer, R. K., & Cegielski, C. G. (2011). Introduction to information systems. Hoboken, N.J: Wiley.Whitman, M. E., & Mattord, H. J. (2009). Principles of information security.

Boston, Mass: Thomson Course Technology.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Entifying Information Assets, Threats, and Vulnerabilities in Top Assignment”, n.d.)
Entifying Information Assets, Threats, and Vulnerabilities in Top Assignment. Retrieved from https://studentshare.org/information-technology/1682318-entifying-information-assets-threats-and-vulnerabilities-in-top-information-security-breaches-of-the-decade
(Entifying Information Assets, Threats, and Vulnerabilities in Top Assignment)
Entifying Information Assets, Threats, and Vulnerabilities in Top Assignment. https://studentshare.org/information-technology/1682318-entifying-information-assets-threats-and-vulnerabilities-in-top-information-security-breaches-of-the-decade.
“Entifying Information Assets, Threats, and Vulnerabilities in Top Assignment”, n.d. https://studentshare.org/information-technology/1682318-entifying-information-assets-threats-and-vulnerabilities-in-top-information-security-breaches-of-the-decade.
  • Cited: 0 times

CHECK THESE SAMPLES OF Entifying Information Assets, Threats, and Vulnerabilities in Top Information Security Breaches of the Decade

Information Security

However, the possession of complete information is considered to be an incomplete victory if it is not protected in an effective manner against prevailing threats and vulnerabilities.... threats and vulnerabilities There are numerous types of threats and vulnerabilities that are required to be considered for the protection of information.... Outside sources of threats and vulnerabilities include denial of service (DOS) attack, virus and worms attacks....
3 Pages (750 words) Research Paper

Cyber Security Vulnerabilities and Associated Threats

This paper ''Cyber security Vulnerabilities and Associated Threats'' discusses that cyber threat has remained a top concern in most nations because of security concerns.... Research and study have found out that cyber security has continued to increase in intensity and sophistication with time.... Cyber threat has remained a top concern in most nations because of security concerns.... Research and study have found out that cyber security has continued to increase in intensity and sophistication with time....
7 Pages (1750 words) Term Paper

Industrial Espionage in America

The information revolution and the advances in technology during the past decades has brought to fore many challenges and issues to both governments and businesses – the age-old crime of espionage or the practice of spying to gather secret information is one the most potential… While high technology offers the ability to collect and use information for competitive edge over others in meeting business and government objectives, it also makes modern information and d nations and businesses vulnerable as information can be stolen from electronic storage media and transmitted in seconds without even physically removing the data....
11 Pages (2750 words) Essay

Information Security Management

That makes monitoring and identification of security breaches a complicated process.... The writer of the paper "information security Management" gives detailed information about the Systems Security Engineering Capability Maturity Model (SSE-CMM) security management framework considering and analyzing the diagram giving at the beginning of the paper.... information security Management Insert Insert Question Consider the diagram above from the Systems Security Engineering Capability Maturity Model (SSE-CMM) security management framework....
1 Pages (250 words) Assignment

Information Security Risk and the Possible Threats to Information Security

The paper describes information security risk as any danger that may lead to the loss or damage of information.... While determining the course of action to be taken in maximizing security, the current activities and performance of the current information systems should be properly scrutinized.... This means that the information concerning these organizations can be accessed from any place in the whole world.... The most common threat to information is computer viruses....
7 Pages (1750 words) Research Paper

Information Technology: Surveillance Security

Organizations require advanced protection and security from these threats and vulnerabilities.... The report demonstrates a typical surveillance system for an organization, in order to protect the critical information assets from physical theft, unauthorized access, and natural disasters.... The IP cameras powered with PoE will share a secure input of uninterrupted power The information assets are secured by a physical lock along with a biometric detection mechanism for monitoring and logging activities of an employee Moreover, the new and advanced form of technology has also facilitated vulnerabilities and threats to be more intelligent....
8 Pages (2000 words) Assignment

IT Threats to Information Security

This essay "IT Threats to information security" presents information technology that has made many tasks easier to perform it has also brought certain threats that did not exist before its invention.... Some information security threats also lead to reputation damage which is sometimes irreparable....             Companies need to ensure that they have put enough information security measures to try and avoid these threats....
2 Pages (500 words) Essay

Information Security Policies

… Table of ContentsNumber range 1-3INTRODUCTIONInformation security policies and strategies are based on a set of guidelines and rules that promote standardized response to some information security issue that can be come across, as a result permitting Table of ContentsNumber range 1-3INTRODUCTIONInformation security policies and strategies are based on a set of guidelines and rules that promote standardized response to some information security issue that can be come across, as a result permitting a team of IT experts to instantly recognize what is being performed in some situation....
9 Pages (2250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us