StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

IT security threats - Research Paper Example

Cite this document
Summary
One of the threats to IT according to CERT (Computer Emergency Response Team) program is the insider threat (from employees, contractors or even business partners) since they are in a better position to access the information system of the organization without detection…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
IT security threats
Read Text Preview

Extract of sample "IT security threats"

IT security threats Affiliation: Discuss global IT security threats and potentialsolutionsOne of the threats to IT according to CERT (Computer Emergency Response Team) program is the insider threat (from employees, contractors or even business partners) since they are in a better position to access the information system of the organization without detection (http://www.cert.org/). The solutions to this are to enforce strict passwords and having account management practices as well as policies, responding quickly to suspicious and or disruptive behavior and especially on the information technology systems, enforcing stringent security access and controls and has less privileged access to users of the sensitive information systems (Silowash, Cappelli, Moore, Trzeciak, Shimeall and Flynn, 2012).

The other threat to information technology is the threat of credit card fraud which leads to unauthorized use of a credit card (Turban and Volonino, 2011). Some of the potential solutions includes avoiding to give out the credit card but rather opt to enter the credit card number on a secure online order, avoiding to disclose credit card number and other details on websites that are not secure or on emails, avoiding to leave the credit cards and other receipts that contain the credit card details lying around or even writing of PIN number where it can be easily found (http://www.

scambusters.org/CreditCardFraud.html).Other than the above two threats, Microsoft provides other threats like spoofing and tampering mainly conducted by cyber criminals and spies. In order to prevent or stop these threats, installing backups regularly, coming up with more tough and complicated configurations that will not be easily broken into and installing firewalls are some of the basic security precautions people and organizations should make (Springer, 2010).ReferencesCert Program. Retrieved from: http://www.cert.org/Scambusters.

Retrieved from: http://www.scambusters.org/CreditCardFraud.htmlSilowash, G., Cappelli, D., Moore, A., Trzeciak, R., Shimeall, T. and Flynn, L. (2012). Common Sense Guide to Mitigating Insider Threats, 4th Edition (CMU/SEI-2012-TR-012). Retrieved January 24, 2013, from the Software Engineering Institute, Carnegie Mellon University website: http://www.sei.cmu.edu/library/abstracts/reports/12tr012.cfmSpringer. (2010). Security for Web Services and Service-Oriented Architectures. New York: Springer.Turban, E. and Volonino, L. (2011). Information Technology for Management: Improving Strategic and Operational Performance (8th Ed.). New Jersey: Wiley.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“IT security threats Research Paper Example | Topics and Well Written Essays - 250 words”, n.d.)
IT security threats Research Paper Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1613303-it-security-threats
(IT Security Threats Research Paper Example | Topics and Well Written Essays - 250 Words)
IT Security Threats Research Paper Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1613303-it-security-threats.
“IT Security Threats Research Paper Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1613303-it-security-threats.
  • Cited: 0 times

CHECK THESE SAMPLES OF IT security threats

Threat Assessment & Physical Security

With the recent threats of terrorism in the city and their link to white supremacists plus the recent beating of the principal's chief assistant, the media has made speculations pointing to the principal as one of the possible perpetrators.... In the paper “Threat Assessment & Physical security” the author provides overview of scenario Due to certain events and certain medical conditions, the principal, a 40-something Caucasian is confined to a wheelchair and needs to be accompanied by a nurse twenty-four hours....
6 Pages (1500 words) Case Study

Security Threats in Louisiana

hellip; According to the paper, security threats in Louisiana, the security system for the shopping mall should encompass the following areas: a preventative intelligence infrastructure; advanced technological means; security procedures; professionally trained personnel; and inspections, supervisions and exercises or simulations.... nbsp;The most common threats come from clients, employees and suppliers.... As identified in PSOS (2011), “on the day-to-day level, the most common threats come from clients, employees and suppliers....
1 Pages (250 words) Term Paper

Security Threats and Defenses

The successful operation of any organization is highly dependent on the security threats and defenses Role of information system security The term social security in the context of organization is defined as the act in which, employees of an organization are manipulated by outsiders to rely key and confidential information details regarding an organization (Hadnagy, 2011).... This aids in that employees can report underlying identified security threats before they occur....
2 Pages (500 words) Essay

Systems Analysis and Design

Preparing for the Top IT security threats of 2013.... he most crucial security issues facing organizations today are data security, employee security, health risks, and physical security.... A 2012 report by statistics organization Securitas showed that organizations, irrespective of size, dealt with data security issues most seriously (Wisegate 5).... Employee security is the protection of employees from other workers, and internal and external dangers....
1 Pages (250 words) Essay

Threats to the Global Security

This paper seeks to analyse which country between Iran and Russia imposes greater security to the whole world.... Nuclear weapons that were highly accessible to the Iranian regime had a very severe repercussions for the security of the American state and even to its allies.... Israel on the other hand was also at great security risks as most of the leaders from the Iran continuously declared a war of trying to wipe out the Israel from the global map....
4 Pages (1000 words) Essay

Information Security Risk and the Possible Threats to Information Security

The paper describes information security risk as any danger that may lead to the loss or damage of information.... While determining the course of action to be taken in maximizing security, the current activities and performance of the current information systems should be properly scrutinized....
7 Pages (1750 words) Research Paper

Information Technology Threats and Security

From the paper "Information Technology threats and Security" it is clear that The threats are explored like a virus, malware, malicious activities, etc.... The growing demand for dependency on information technology requires the high demand for the prevention of threats and improved security as McCarthy (2013) founded in his work on E-authentication.... There are many effective antivirus and internet security software that detect the latest threats....
6 Pages (1500 words) Assignment

Global Threats to the US National Security

This term paper "Global threats to the US National Security" presents threats to the National Security Council, that affect the world population at large.... The world has seen threats to security that are brought about because groups of people have prioritized personal interests.... The National Security Council is entrusted with protecting the interests of the citizens and deliberates to neutralize the global threats.... This article will address the current nature of threats and the major priorities that the National Security Council should deal with them effectively....
2 Pages (500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us