Information security in a real-world business or government agency - Research Paper/ - Case Study Example

Comments (0) Cite this document
Credit card companies handle private and sensitive information about customers; hence it has to follow various security policies. This case study focuses on credit card processing company CardSystems…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Information security in a real-world business or government agency - Research Paper/ Case Study
Read TextPreview

Extract of sample "Information security in a real-world business or government agency - Research Paper/"

Download file to see previous pages Later in 2005, Cardsystems implemented payment cardholder information (PCI) which was assembled by security standards council (SSC) to address the changing technology. With the advancement of wireless technology, the SCC added various guidelines to PCI to hamper data theft through wireless medium. The case will highlight the guidelines of having wireless security. The case also cites the importance of using open source security.
Credit cards have become very popular and are being widely used by the consumers. It enables the bearer of card to buy goods and services from retailers and merchants. With the boom in Internet marketing or e-business, credit cards have become important it is convenient and easier to buy from the Internet. The credit cards offer many benefits like credit rating, rewards for the use of the credit cards and are also a useful tool to manage expense. Examples of company offering credit cards are Visa, American express, Discover and MasterCard. They offer their services to banks and other businesses for the usage of credit cards.
Credit cards companies and businesses dealing with credit cards store important and sensitive information like social security number, birth date and home address. Hence, they are prime target by the hackers and are very vulnerable to data theft and data leak. To address the issue of information security, Visa and MasterCard had developed their own security standards in 2001 like Visa’s cardholder information security program (CISP) and MasterCard’s site data protection program (SDP). These programs were initiated for the protection of data and information in an effort to prevent credit-card data theft. These programs had become a required criterion for businesses handling credit-card transactions from financial banks to universities (Stamp, 2005, Pg 172).
The scandal of 40 million credit card numbers being stolen from CardSystems in June, 2005 rocked the world around. Analysts debated ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Information security in a real-world business or government agency - Case Study”, n.d.)
Information security in a real-world business or government agency - Case Study. Retrieved from
(Information Security in a Real-World Business or Government Agency - Case Study)
Information Security in a Real-World Business or Government Agency - Case Study.
“Information Security in a Real-World Business or Government Agency - Case Study”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Information security in a real-world business or government agency - Research Paper/ Case Study

Information Security

...its business activities. The progress in the field of information technology has been favorable because it has brought various benefits for the users all around the world. However, along with many significant benefits, the advancement in information technology has also created various issues related to the security of computer networks. These network-related issues need to be tackled properly in order to make the internet world safe and secure. Literature Review regarding Current State of Network Security Kaminsky (2010) asserts, “Network security comprises the measures a company takes to protect its computer system”. It...
5 Pages(1250 words)Research Paper

Information Security

...? Need for Information Security Introduction The intervention of technology has increased competition for organizations since communication has broken geographical barriers and has transformed the world into a global village. The increasing competition makes it vital for all types of organizations to be equipped with information and data about their customers, market trends, consumer behavior etc. However, the possession of complete information is considered to be an incomplete victory if it is not protected in an effective manner against prevailing threats and vulnerabilities. Lack of awareness and execution to protect company’s information assets can...
3 Pages(750 words)Research Paper

Computer Information Security Certification individuals who have attained adequate knowledge, skills and experience in internet security (Barnard and Rossouw, 1998, p. 75). International information systems are web based and apply online applications to perform business functions such as e-business and transactions. Thus an ISC2 means that an individual is able to secure servers and web based networks from malware. Moreover, this individual is able to secure systems from internet based fraud (Lingblom, 2003, p. 51). These individuals normally work in financial institutions and telecommunication industries as internet security officers. With experience these...
8 Pages(2000 words)Research Paper

Successful information security management

... Infrastructure policy Planning  IT Security and Risk Manager  If not aligned with business, planning will not be effective Information Security Steering Committee Personnel  IT Security and Risk Manager Embezzlement, espionage Background checks Physical environment  IT Security and Risk Manager  Unauthorized access, data theft, data corruption, deletion, risk to critical assets Surveillance Policy  IT Security and Risk Manager No information security culture Infosec Policy Operations  IT Security and Risk Manager Hacking, virus infection, unauthorized access, loss of data, loss of business and reputation,  data theft, data corruption, deletion Infosec Governance Outsourcing  IT Security and Risk Manager  Hacking, virus infection... ...
9 Pages(2250 words)Research Paper

Information Security

...Information Security White Paper (Section) Due) Information plays a very important role in the decision makingprocess within a business organization irrespective of the organization’s size. Information is increasingly acquiring central role in business given the repercussions associated with incorrect information or lack thereof. Information theft posses a great danger to small businesses as well corporations such as profit losses, damage to reputation besides the costs associated with litigations. It is a key parameter affecting business risk....
3 Pages(750 words)Research Paper

Information Technology- Security

...fundamental when building the required trust and reliability of the information for consumers. Consequently, the concept has enhanced the availability, integrity, authenticity, confidentiality, and non- repudiation of information as discussed in this piece. Information assurances policies and its goals, mission and objectives An organization defines its information assurance policy as a course of actions pursued to enable organizations to obtain information assurance security. As such, the organizations formulate policies that describe appropriate behaviour concerning the use of information. In the contemporary...
2 Pages(500 words)Research Paper

Information Security Risk Management

...Information Security Risk Management Introduction Information security is the protection of information for business continuity as it is fundamental for maximizing the business opportunities and return on investment. Information security and risk management has become a critical business discipline with sales, marketing, financial management and Human resource. 2. Literature Risk management and its role in the organization Risk was called as a main cause for uncertainty in the business organizations. Therefore, business companies focus...
2 Pages(500 words)Case Study

Information system security

...Information System Security Table of Contents 3 Introduction 4 Discussion 5 Certification Standards of the Information Security System 6 Framework and Assumptions for Creation of Information Security System 6 Necessity of Information Security System 9 Information System Security from a Management Perspective 10 Security Issues Associated with Management of an Information System Security and the Appropriate Risk Management 11 Cryptographic Concepts Associated with the Information System...
12 Pages(3000 words)Research Paper

Information Security Management

...between customers and businesses (ITIL, 2014). Techniques and Methods ‘Database Management System’ (DBMS) is often used for managing huge figure of data efficiently. It is employed as an effective tool ensuring that the information flow system is organised appropriately (Ramakrishnan and Gehrke, 2003). As a member of the Information Security Group of the large international organisation, it is to be affirmed that data or information is required to be managed as well as stored effectively with the aim of accomplishing superior competitive position. In this regard, CISO is required to adopt BCM measure for managing data. BCM would assist the organisation...
5 Pages(1250 words)Research Paper

U.S. Government Agency Executive Branch

...The Central Intelligence Agency History and Responsibility The Central Intelligence Agency (CIA) is a branch of the U.S.Government that deals with collection and verification of foreign intelligence. The agency is mandated to gather, analyze and interpret all information on national security from different parts of the world. The agency emphasizes the use of human intelligence to complete its mandate. The Central Intelligence Agency answers to the Director of National Intelligence. The paper presents the history and evaluation of the Central Intelligence Agency. The CIA has been chosen because of the...
3 Pages(750 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Information security in a real-world business or government agency - Research Paper/ Case Study for FREE!

Contact Us