Nobody downloaded yet

IT Security - Essay Example

Comments (0) Cite this document
Summary
The Managing Director (MD) of CBC Corporation commissions ESS to analyse the security needs within the company, CBC Corporation. As such, ESS has to undertake a security analysis of the company, such as identifying the…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
IT Security
Read TextPreview

Extract of sample "IT Security"

Download file to see previous pages A sneak peek into the operations of the CBC Corporation provides that the company has over one thousand employees who are on full time employment. As such, the company admits 1000 persons into the company on a daily basis that can be a source of threat to the operations of the company, especially on its IT security systems. In addition, the company also has a vast array of Information Systems, which include about 600 UNIX workstations, 600 terminal emulators, 1000 PCs running Windows, 300 external client dial-in systems, as well as 100 hundred authorised at-home dial-in systems. Of the 1000 members of staff, 160 of them are full-time staff members of the Information technology department. This consists of about 16% of the company’s total workforce team.
As such, it so appears that the company has to protect its assets, as well as sensitive information from theft of all kinds, be it leakage, internal operators of the company, as well as external perpetrators keen on acquiring illegally the company’s assets and information. Therefore, the work cut out for ESS is to evaluate the state of security at the company and suggest possible solutions to the arising threats.
The company may end up losing its assets as well as critical information to thieves, or leaking out confidential information to the wrong hands because of its poor security network. An overview of the company’s security system provides that it is tantamount to a number of threats, both external as well as internal owing to the inappropriate security measures put in place by the management of the company. The following provides some of the most important threats that the company needs to attend to immediately. It also categorizes the physical assets that the company needs to put security for against thieves.
The main assets of the company include 600 UNIX workstations, 600 terminal emulators, 1000 PCs running Windows, 300 external client dial-in systems, as well as 100 ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“IT Security Essay Example | Topics and Well Written Essays - 2250 words”, n.d.)
IT Security Essay Example | Topics and Well Written Essays - 2250 words. Retrieved from https://studentshare.org/information-technology/1691646-it-security
(IT Security Essay Example | Topics and Well Written Essays - 2250 Words)
IT Security Essay Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/information-technology/1691646-it-security.
“IT Security Essay Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/information-technology/1691646-it-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF IT Security

IT Security. Epworth

...Task IT SECURITY The field of IT has many developments that enable those using it to store profile data. The data is widely applied by many firms because it is exceedingly reliable. Its reliability lies in the fact that information stored does not leak into the hands of the enemy. The developments in technology have enabled people to save most of their bulky information in database (Yilmaz, 2010). This is because the database can hold as much information as possible. The storage of information is at times prone to intrusion from the foes. It is at this point that the persons using the database have to ensure that there is utmost security of the stored information. Other trends in IT include such things...
4 Pages(1000 words)Assignment

IT security

...?SYSTEMS MANAGEMENT AND SECURITY FOR WAL-MART BUSINESS Systems Management and Security for Wal-Mart Business Affiliation TABLE OF CONTEST INTRODUCTION 3 WAL-MART: BUSINESS OVERVIEW 4 INFORMATION SECURITY: BASIC NEED 6 WAL-MART INFORMATION SECURITY POLICY 8 INFORMATION SECURITY AT WAL-MART 10 Communications Security Solution 10 Data Transfer Security 11 Evaluation and Feedback 12 Audits 12 SUGGESTIONS FOR ORGANIZATIONAL SECURITY IMPROVEMENT 13 VPN (Virtual Private Network) 13 Improved Privacy Policy and IT security Strategy 13 PROBLEMS CAN EMERGE 14 References 15 INTRODUCTION Information security refers to the process of securing secret and important business as well as personal data and information. It secures its confidentiality... ,...
10 Pages(2500 words)Coursework

Gatsby Illustrates the 7 deadly sins

7 Pages(1750 words)Essay

IT - Security Plan

...?STAGE 5: SECURITY PLAN Stage 5: Security Plan Affiliation Table of Contents Purpose 3 Scope 4 Target Application Identification and Description 5 Security Issues: 5 Target Application 6 Plan Owner Contact Information 7 Enterprise Architecture/Infrastructure That Supports the Application 7 Organizational Roles and Responsibilities 10 Director or CEO of the Organization: 10 Incident Response Point of Contact: 10 Security Plan Owner: 10 End User: 11 Security Requirements 11 Security Solutions 12 Security Controls 13 Plan Maintenance 14 Plan Approval 14 Well-Health Executive 15 References 15 Elemental Cyber Security, Inc. (2011). Elemental Security and Information Security Policy. Retrieved December 20, 2011, from http... ...
7 Pages(1750 words)Case Study

IT Security Policy Framework

...? Full Paper Question Information Security Framework The Information Security framework is considered as the most wide-ranging framework model that guarantees entire security solutions of information by reducing business risks. In addition, information security does not only focus on technological aspects, but also pointing out other core elements in an organization. For instance people, procedures, business methodologies etc. this is also considered as mandatory for information security. The complete information security framework should include the following main characteristics (HITRUST): Recommended sound security...
4 Pages(1000 words)Essay

An IT security consultant

...? An IT Security Consultant An IT Security Consultant A vulnerability could be a flaw, error or weakness in an Information Technology (IT) system which an attacker may exploit and alter the system’s normal behavior (Christey 2007). Vulnerabilities offer the attackers possible entry points into an organization’s system. Considering the exposure of most systems to multiple users through the internet, and environments such as the operating system, the vulnerability to attack increases, with unpredictable consequences in costs and damages (Zellan 2003). The attackers aim at gaining privileges, valuable information and control of the system. This paper will explain four methodologies and how they can be used...
3 Pages(750 words)Essay

IT Security

...? IT Security and the Impact on CIO Roles Business 26th April, Organizational assets and operations have become increasingly dependent on information technology to accomplish their mission and goals set by the management. The increased use of information technology brings about threats to the system itself, both to hardware and software and the integrity of business operations. Threats to these systems can be either directed at the information stored in the system itself or aimed at affecting the day to day operations of the organization (Bowen, Chew and Hash, 2007). Information security threats have made governments to enact information communications laws with an aim to set requirements and standards...
4 Pages(1000 words)Essay

IT security threats

...IT security threats Affiliation: Discuss global IT security threats and potentialsolutions One of the threats to IT according to CERT (Computer Emergency Response Team) program is the insider threat (from employees, contractors or even business partners) since they are in a better position to access the information system of the organization without detection (http://www.cert.org/). The solutions to this are to enforce strict passwords and having account management practices as well as policies, responding quickly to suspicious and or disruptive behavior and especially on the information technology systems, enforcing stringent security access and controls and has less privileged access to users of the sensitive information systems... ...
1 Pages(250 words)Research Paper

IT Security & Sarbanes-Oxley Act

...IT Security & Sarbanes-Oxley Act I) Introduction Also known as the Corporate and Auditing Accountability and Responsibility Act [in the House], and the Public Company Accounting Reform and Investor Protection Act [in the Senate], the Sarbanes-Oxley Act 2002 came into being, following its enactment on July 30th, 2002. This law derives its name from its sponsors, the then United States Senator Paul Sarbanes and Representative Michael Garver Oxley. Because of this, this Act is sometimes informally referred to as SOX or Sarbox. The Sarbanes-Oxley Act of 2002 sought to set enhanced standards for all American public company management, boards and accounting firms. However, it is a fact that Sarbox also provides parameters and...
5 Pages(1250 words)Term Paper

IT Security System

...Use of IT in Security System by Goodings Landscaping and Nursery Company Everything operates within a hierarchy, and security is no exception. Therefore, Goodings Landscaping and Nursery Company incorporating the Information Technology in its security would help in the boosting the on-site security system. However, going for any Information Technology integration system, the following questions should be in the mind of the security directors; what assets are we trying to protect? From whom are the assets being protected? Against what kind of attack or misuse to protect from? And how can use of IT improve the operations of the company’s client and disrupt...
2 Pages(500 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic IT Security for FREE!

Contact Us