StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Roles: Contemporary Issues Using News Investigations - Report Example

Summary
This report "Security Roles: Contemporary Issues Using News Investigations'focuses on two contemporary issues related to the security issues within organizations and tries to determine what could be the possible recommendations for the companies to protect their activities and information…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.8% of users find it useful
Security Roles: Contemporary Issues Using News Investigations
Read Text Preview

Extract of sample "Security Roles: Contemporary Issues Using News Investigations"

Security Roles: Discussion on Contemporary Issues Using News Articles Introduction: The roles of the security measures can be realized to be increasing owing to the problems encountered within different organizations. Security problems within organizations are primarily associated with the security of the information of the company. With the increasing use of the information technology in the present times, the responsibilities for the security of the information have also increased (Quigley, 2008, p.319). Thus the security of the information is of serious concern for all business organizations (Zhdanov, 2007, p.1). The current study focuses on two contemporary issues in related to the security issues within organizations and tries to determine what could be the possible recommendations for the companies to protect their activities and information. Security as an Organizational Problem: Contemporary Issues: The problem of security within organizations has increased at a high level concerning the managements of different organizations. Different organizations can be found to take measures for the protection of their data and information that can be understood to be of significant importance in the present times of technology dependent world. Although companies are trying their best to enhance their internal security measures, yet incidents of thefts and other related disasters in relation to organizational information can be observed to have increased. Thus firms and their management teams tend to decide on more advanced and tighter sources of security to prevent loss of their companies and protect their information to the utmost level possible (Zhdanov, 2007, p.1). One of the recent news that had recently come up in regard to the internal security of organizations was about the OMX Group. The company was said to have suffered cyber attacks that led to investigations being conducted on the security systems of the company. The investigation processes discovered that the company’s use of lax security practices assisted the hackers to operate and gain access to their information systems and data. Further investigations on the company obtained that the basic structure of the information architecture of the company was in tune with the needs of the company. However, certain computers were found to be outdated and lacking proper antivirus and other necessary protection measures. The role of the vigilant in regard to the protection system was also found to be lacking (Shalal-Esa & Finkle, 2011). Thus the effect of the cyber attack can be realized creating concerns for the entire industry and other companies listed on Nasdaq. It also brings out the fact that the security concerns for the particular company lacked that made it easy for the hackers to affect the company. The use of the software and the protection measures were not up to the standards and were not updated as well. Thus such a case not only affected the operations of the OMX Group but created wider concerns for the entire industry as a whole. Another related news in the recent times that can be viewed in this regard is the Corero Company’s release of the new distributed denial-of-service protection system. The denial-of-service is known to be a kind of cyber attack where a number of remote techniques are at first conciliated and later they are utilized to attack a larger and single information system. This hampers the computers and the internal data severely and might shut down machines as well. Corero Company has thus come up with a product in the market that intends to protect computers and hence organizational information from this attack. The product is named as DDoS Defense System (DDS). It blocks all attacks at the level of application as well as hinders any harmful attacks from direct networks (Clark, 2011). The Corero news reflects the significant need for information protection and hence the company can be found to have obtained a strict measure of protection of their organizational information. This also suggests that there are advanced measures against the harmful attacks that can be predicted to create disaster to a company’s activities and destroy all information necessary for the organizational performances. The two news reflect the current scenario in regard to the security issues internal to an organization implying clearly that lack of security can create huge problems for the organizations leading to the enhanced need for adoption of available security options. Probable Solutions: The most important realization out of the current study and the two recent news that have been discussed is that suitable security systems are extremely significant in the modern organizations in order to protect the organizational information and prevent loss for the company. Since cybercrime has increased to a great level, thus it is recommended for each and every organization to apply the available security measures to protect their information systems. This would involve the systems to protect the information from the harmful influence of the cyber attacks. In this context it is also significant to mention and recommend that the individual organization also needs to be more careful. As in the case of OMX Group, it could be observed the company had its own lack of protection and security as well that led to the cyber attack to take place. Thus organizations and the organizational employees need to understand the importance of the security measures and follow them in their respective systems to avoid such attacks in the internal organization. In the present times, the security systems have become so relevant and comfortable to be used, that the IT management people can easily make out how to use the data from the security systems when in need (Network Security Management, 2011). This implies that it should not be a difficult job for the organizations to take such measures for the safety and protection of organizational information. Thus the most important recommendation to avoid security problems within organizations can be understood to be the personnel being more responsible and updated in their information related activities. This includes updating the computers and the software, checking the software for its safety, incorporating protective security systems and measures in the computer systems that can hinder the attacks, and regularly monitor their protection systems to realize the need for any change in the process. Following these measures sincerely might be able to protect an organization from the security issues to a great extent. Conclusion: The two contemporary issues focused in the study based on the security issues and the thereby possible measures, within organizations, reflect that in the modern world where most of the activities of the organizations are technology dependent and information based, prior understanding of the protective measures and incorporating such measures within the organizational management is a significant necessity in order to keep the organization out of security related problems. References 1) Clark, Q. (2011). Company Offers Around The Clock DDoS Protection, Security Pro News, Retrieved on November 28, 2011 from: http://www.securitypronews.com/insiderreports/insider/spn-49-20111021CompanyoffersaroundtheclockDDoSprotection.html 2) Network Security Management (2011), Search Security, Retrieved on November 28, 2011 from: http://searchsecurity.techtarget.com/guide/Network-Security-Management 3) Quigley, M. (2008). Encyclopedia of information ethics and security, Philadelphia: Idea Group Inc 4) Shalal-Esa, A. & J. Finkle (2011). Exclusive: Lax security at Nasdaq helped hackers, Yahoo News, Retrieved on November 28, 2011 from: http://news.yahoo.com/exclusive-lax-security-nasdaq-helped-hackers-231729383.html 5) Zhdanov, D. (2007). Information security in organizations: Drivers, policies and compliance incentives, Michigan: ProQuest Read More

CHECK THESE SAMPLES OF Security Roles: Contemporary Issues Using News Investigations

Enforcing Immigration Law: The Role of State and Local Law Enforcement

investigations by the police and federal officials had a tinge of racial profiling after the September 11 attacks (Akram and Johnson, 2002).... The White House even released guidelines which prevented federal officers from using race as a standard in carrying out routine investigations, however, these guidelines also expressly exempted investigations in relation to terrorism and threats to national security (Miller, 2005).... Reduced focus on criminal investigations Allowing the state and local police officers to implement immigration laws through their own non-federally supported programs creates a situation where the criminal investigation may be de-emphasized and the focus of their functions now become immigration enforcement....
18 Pages (4500 words) Research Paper

Crime Scene Investigations and Death Investigations

This research paper "Crime Scene investigations and Death investigations" attempts to review the procedures that occur in murder crime scenes, including those that also have electronic crimes connected.... The review will show the basic steps within the regular procedure of securing the scene....
52 Pages (13000 words) Research Paper

The Place of Public Police in Contemporary Security

The other role of the Police is to carry out investigations.... The aim of investigations is to find out the persons responsible for crimes already committed so as to bring them to book.... bviously the main method of investigations has always been asking questions.... Such contradictions have often resulted in massive cover up operations which may include destruction of gathered evidence, sabotage of investigations or even murder of police officers by their own kind....
15 Pages (3750 words) Essay

How Private Security Companies are Doing Social Good and Benefitting Common Purposes

It investigates the role of private security in public works and the roles.... This essay " How Private security Companies are Doing Social Good and Benefitting Common Purposes?... examines the legislation set up under the Private security Industry Act 2001 and defines the meaning of public purpose.... Therefore, the deployment of private security was very high, which declined during the depression days.... Once again, there was a significant increase in private security due to heightened emphasis on government security and an increase in plant security for the industry....
30 Pages (7500 words) Essay

Russias Solvent Union Collapse and Economic Growth and Development

Before this, various agencies played the role the crimes investigation and it was later known that these agencies lacked coordination and necessary resources to conduct the investigations.... he Russian media has also exposed the news that those who suffered the personnel cuts were only the low-ranking police officers whereas the managerial supervisors experienced no cut off.... This is because the law enforcement institutions have being using their powers poorly hence affecting the well-being of the Russian society negatively....
10 Pages (2500 words) Research Paper

Working in a Law Firm

ews item reflective analysisThe six news items analyzed include news twisters reported based on the outcome of various cases touching security.... An AAP reporter's news report read 'A Muslim convert accused of plotting to blow up Israel's embassy in Canberra became the first Australian convicted under new terror laws Friday after suddenly pleading guilty during his trial' (Blogs.... n audio news item on ABC news on R v Ul-Haque (Unreported, NSW Supreme Court, Bell J, 8 February 2006) in which the ASIO lost/dropped the case is non-partisan (ABC news, 2015)....
27 Pages (6750 words) Report

Work Journal: Security and Law

The paper 'Work Journal: security and Law' states 'The Reluctant Fundamentalist' has a likelihood of making certain people confused in the manner it holds the US responsible for the repercussions of its actions in the world.... Latest analysis by the information security media indicated that in connection with the US bureau of statistics shows that the number of the information security analyst workers has ascended by 68 % since the BLS started the production of these jobs reports in 2011....
30 Pages (7500 words) Essay

The Provisions of the Security Laws in Australia

contemporary issues concerning security that are not legislated are first investigated to ensure that there is a need for regulation and to identify the areas that such law should cover.... rom this article, I have learned that the law plays an important part in issues of security.... The paper "The Provisions of the security Laws in Australia" discusses the private security sector.... The changes to Australia's national security laws since September 11 are not enough to protect Australians from terrorist attacks....
41 Pages (10250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us