StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information security in a real-world business or government agency - Research Paper/ - Case Study Example

Comments (0) Cite this document
Summary
Credit card companies handle private and sensitive information about customers; hence it has to follow various security policies. This case study focuses on credit card processing company CardSystems…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92% of users find it useful
Information security in a real-world business or government agency - Research Paper/ Case Study
Read TextPreview

Extract of sample "Information security in a real-world business or government agency - Research Paper/"

Download file to see previous pages Later in 2005, Cardsystems implemented payment cardholder information (PCI) which was assembled by security standards council (SSC) to address the changing technology. With the advancement of wireless technology, the SCC added various guidelines to PCI to hamper data theft through wireless medium. The case will highlight the guidelines of having wireless security. The case also cites the importance of using open source security.
Credit cards have become very popular and are being widely used by the consumers. It enables the bearer of card to buy goods and services from retailers and merchants. With the boom in Internet marketing or e-business, credit cards have become important it is convenient and easier to buy from the Internet. The credit cards offer many benefits like credit rating, rewards for the use of the credit cards and are also a useful tool to manage expense. Examples of company offering credit cards are Visa, American express, Discover and MasterCard. They offer their services to banks and other businesses for the usage of credit cards.
Credit cards companies and businesses dealing with credit cards store important and sensitive information like social security number, birth date and home address. Hence, they are prime target by the hackers and are very vulnerable to data theft and data leak. To address the issue of information security, Visa and MasterCard had developed their own security standards in 2001 like Visa’s cardholder information security program (CISP) and MasterCard’s site data protection program (SDP). These programs were initiated for the protection of data and information in an effort to prevent credit-card data theft. These programs had become a required criterion for businesses handling credit-card transactions from financial banks to universities (Stamp, 2005, Pg 172).
The scandal of 40 million credit card numbers being stolen from CardSystems in June, 2005 rocked the world around. Analysts debated ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information security in a real-world business or government agency - Case Study”, n.d.)
Information security in a real-world business or government agency - Case Study. Retrieved from https://studentshare.org/miscellaneous/1558030-information-security-in-a-real-world-business-or-government-agency-research-paper-case-study
(Information Security in a Real-World Business or Government Agency - Case Study)
Information Security in a Real-World Business or Government Agency - Case Study. https://studentshare.org/miscellaneous/1558030-information-security-in-a-real-world-business-or-government-agency-research-paper-case-study.
“Information Security in a Real-World Business or Government Agency - Case Study”, n.d. https://studentshare.org/miscellaneous/1558030-information-security-in-a-real-world-business-or-government-agency-research-paper-case-study.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Information security in a real-world business or government agency - Research Paper/ Case Study

Information Security

The progress in the field of information technology has been favorable because it has brought various benefits for the users all around the world. However, along with many significant benefits, the advancement in information technology has also created various issues related to the security of computer networks. These network-related issues need to be tackled properly in order to make the internet world safe and secure. Literature Review regarding Current State of Network Security Kaminsky (2010) asserts, “Network security comprises the measures a company takes to protect its computer system”. It is evident from the above statement that network security deals with the protection of information stored in the computer systems. Ther...
5 Pages(1250 words)Research Paper

Information Security

...? Need for Information Security Introduction The intervention of technology has increased competition for organizations since communication has broken geographical barriers and has transformed the world into a global village. The increasing competition makes it vital for all types of organizations to be equipped with information and data about their customers, market trends, consumer behavior etc. However, the possession of complete information is considered to be an incomplete victory if it is not protected in an effective manner against prevailing threats and vulnerabilities. Lack of awareness and execution to protect company’s information assets can result in loss of revenues, bad reputation for the company and probable law suits...
3 Pages(750 words)Research Paper

Computer Information Security Certification

... by individuals who have attained adequate knowledge, skills and experience in internet security (Barnard and Rossouw, 1998, p. 75). International information systems are web based and apply online applications to perform business functions such as e-business and transactions. Thus an ISC2 means that an individual is able to secure servers and web based networks from malware. Moreover, this individual is able to secure systems from internet based fraud (Lingblom, 2003, p. 51). These individuals normally work in financial institutions and telecommunication industries as internet security officers. With experience these individuals are able to work in any organization in the world and provide internet security within information systems...
8 Pages(2000 words)Research Paper

Successful information security management

... Infrastructure policy Planning  IT Security and Risk Manager  If not aligned with business, planning will not be effective Information Security Steering Committee Personnel  IT Security and Risk Manager Embezzlement, espionage Background checks Physical environment  IT Security and Risk Manager  Unauthorized access, data theft, data corruption, deletion, risk to critical assets Surveillance Policy  IT Security and Risk Manager No information security culture Infosec Policy Operations  IT Security and Risk Manager Hacking, virus infection, unauthorized access, loss of data, loss of business and reputation,  data theft, data corruption, deletion Infosec Governance Outsourcing  IT Security and Risk Manager  Hacking, virus infection...
9 Pages(2250 words)Research Paper

Information Security Risk Management

...Information Security Risk Management Introduction Information security is the protection of information for business continuity as it is fundamental for maximizing the business opportunities and return on investment. Information security and risk management has become a critical business discipline with sales, marketing, financial management and Human resource. 2. Literature Risk management and its role in the organization Risk was called as a main cause for uncertainty in the business organizations. Therefore, business companies focus upon the risk identification, and manage it before these risks impact the business decisions. Organizations having control over risk management can compromise confidently for future decisions. Organization...
2 Pages(500 words)Case Study

Information Security Management

With this concern, the research paper intends to investigate software tools, certifications, techniques and methods that are currently considered as best practices in the context of managing the business continuity constituents of corporate data.
In the modern day context, organisations are required to adopt effective software tools and techniques along with methods for managing and storing enormous data effectively. Presently, one of the best practices for the continuity of a business is viewed to be the technique of BCM, which can be used by the organisation (Campbell, 2012; FFIEC, 2003). Based on the above discussion, the varied constituents of the appraisal have been discussed in the following:
Presently, different tec...
5 Pages(1250 words)Research Paper

Business in Japan and South Asia

The Allies later overthrew it. ‘In the heyday of the main bank system, a stable system existed in which banks and other financial institutions mobilized and allocated savings in a high-growth economy regulated by controls over a loan, deposit, and bond issue interest rates.’ (Masahiko Aoki & Hugh Patrick, ‘The Japanese Main Bank System’ p 21).
The structure of the keiretsu was analogous to the tree layout or branched format. It was this very structure that also seems to have lent a lot of stability in the early years of its inception. Each major keiretsu had one particular bank as its primary funding nucleus. This bank lent a specific keiretsu’s member companies money because they held positi...
10 Pages(2500 words)Case Study

Business Ethics in the Case of Timberland-City Year

The purpose of this study is to focus on the ethical considerations and dilemmas faced by the organization Timberland in terms of its coalition to City-Year and the steps that are taken and should be taken for the solution of those ethical issues.

In the merger of the two organizations, Timberland and City Year, there are many ethical considerations. To develop legal business relationships between Timberland and City Year and to consider the stipulations of the required business laws, the following ethical considerations should be deemed:
  • None of City Year’s earnings should be incurred to any private shareholder or an individual.
  • City Year cannot participate in any political campaign or...
6 Pages(1500 words)Case Study

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

Role of the Police and Private Security

Hence understanding the criminal justice system is extremely important so that it may be implemented effectively and impartially. Hence, this report will also cover the following areas namely, the three levels of law enforcement in the United States, the interaction between those agencies, the role of the police and private security personnel in homeland security, the role of this group in intelligence gathering and federal funding.

The three levels of law enforcement in the United States cover national, state and local security. This task of homeland security is the responsibility of the Federal Bureau of Investigation (FBI), the state police forces, and the local police force. Each of them has specific areas to cover...
8 Pages(2000 words)Case Study

Business Information Systems

.... This organizational management of Club IT project will provide a better system management and handing. The implementation of new management system will provide: Better organizational management Better information handling Centralized information retrial Identical data format Better online information access Enhanced data security Establishment of Quality of Services (QoS) Gaining better competitive edge Performance enhancement Better inter-departmental communication Enhanced customer management Fast order processing Assessment of Needs In this high competition and complex business management world Club IT requires extensive assistance from the powerful business management systems. These business management systems and enterprise...
8 Pages(2000 words)Case Study

Benefit of Partnership to Company, Trade Union and Government

The John Lewis model of partnership states that the ultimate purpose of business is the happiness of all its members. Hence, when partners “share the responsibilities of ownership as well as its rewards of profit, knowledge, and power”, it is mutually beneficial to all members of the organization (ILO, 1996). The partnership can be a part of the commitment to pluralism and also a part of the non-union agenda (Bacon & Storey, 2000). The national agreement Partnership 2000 defines workplace partnership as “an active relationship based on recognition of common interest to secure the competitiveness, viability, and prosperity of the enterprise” (Doherty, 2008). The interest in the partnership has arisen due...
6 Pages(1500 words)Case Study

Business Finance: Activity Based Costing

At that time, the western manufacturing companies were facing serious competition from their Japanese counterparts. The Japanese automotive and electrical products were capturing the market by their low costs. That prompted the Western companies to innovate new costing techniques that would point out their problems and lower the costs. This reason was the main catalyst in the acceptance of ABC. There was resistance by the management of companies who viewed ABC as detrimental to their interests. In addition, the cost of the impletion of ABC was huge which further disinterested the companies. But what the industry was going through in terms of innovation and competition was enough to pave the way for ABC’s smooth transformatio...
7 Pages(1750 words)Case Study

Decisions in Paradise Business Scenario

This paper discusses solutions for the Kava case study along with an implementation plan.
Kava has topography and geographic location that makes it susceptible to natural disasters such as tidal waves, tsunamis, typhoons, hurricanes, floods, fires, volcanic eruptions, and earthquakes (Decisions in Paradise: How to Be, or Not to Be, 2009). There are other issues in Kava. The population is at high risk for Avian Flu and the population faces an HIV / AIDS epidemic. The island is susceptible to petroleum skills and is an undesirable business risk due to the potential ecological state of the entire island. The region is a high risk for both domestic and foreign terrorist attacks. The costs of importing raw materials into the islan...
6 Pages(1500 words)Case Study

Business Sustainability and Society: Coca-Cola Company

...Running Head: Business Sustainability & Society Business Sustainability & Society [Institute’s Business Sustainability & Society Introduction Since centuries, ethics has been a crucial and significant component of the human societies that contributed enormously in the creation of norms and values through religious influences, as well as through contribution of intellectuals and philosophers in the society. Unfortunately, nowadays, it is an observation that individuals, organizations, and even nations have commenced to overlook the phenomenon of ethics in their practices, specifically in the business sector that has become the major stakeholder confronting criticisms related to ethical practices. Critics (Crane, pp. 23-29, 2007) argue...
10 Pages(2500 words)Case Study

World Bank's Information Security

...STRATEGIC INFORMATION SYSTEMS ANALYSIS Through the years, many technological products and services particularly Information Technology (IT) tools hadand are currently having optimum applications and uses in maximum spheres of human lives. These technological products and importantly IT products and services are being used in many organizations or business. Organizations all over the world have incorporated IT in every aspect of their functioning. From carrying out simple operations to high level advanced operations, IT and its related products has become a ubiquitous entity in organizations. This is quite visible in pan-national organizations like World Bank. World Bank, as the name suggests, has operations throughout the world...
9 Pages(2250 words)Research Paper

Business Ethics of Wal Mart Company

The lack of ethics is one that results in complications such as loss of customer loyalty, inability to continue to progress in society and legalities that can cause the business to become hindered when selling products or services.

A company that is taking shape in the global market is Wal – Mart a superstore that is known for low prices on a variety of products. Consumers that are familiar with Wal – Mart often attribute the products offered by this corporation as convenient, easy to use and at lower prices than other stores. However, there are also continuous questions of how the employees, suppliers, and customers are treated when looking at ethical considerations. One of the common problems that many ha...
6 Pages(1500 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Information security in a real-world business or government agency - Research Paper/ Case Study for FREE!

Contact Us