StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Corporate Security Breaches - Essay Example

Cite this document
Summary
The paper "Corporate Security Breaches" tells that corporations are incorporated bodies that consist of a tremendously large number of shareholders, and in which the actual ownership of the entity can be transferred at any moment without the approval of other shareholders…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
Corporate Security Breaches
Read Text Preview

Extract of sample "Corporate Security Breaches"

? The Management of Corporate Security Introduction Corporations are incorporated bodies that consist oftremendously large number of shareholders, and in which the actual ownership of the entity can be transferred any moment without the approval of other shareholders. Such entities are in most cases under different forms of security attacks, which come from the general society (McCrie 2006). Corporate security categorizes and efficiently moderates or manages, at the early phases, any form of progression that may intimidate the pliability and unrelenting survival of the very corporation (McCrie 2006). In order for a corporate protection to be effective, there has to be an excellent perceptive of the matters that are taking place in the civilization. The company has to be responsive of the surroundings and what is taking place in the general public (McCrie 2006). This paper is going to analyze the extend of understanding that security managers have to go in the latest politics, economy, society, technology, ecology and legal (P.E.S.T.E.L) trends and developments that shall be seen as important for the corporate security. Cybercrimes Many reports have come out in the recent news that computer has now been a target in committing crimes. These are the kinds of crime that put in use a computer and a network where there are several computers interlinked with one another (Santanam, Sethumadhavan and   Virendra 2011). These offences are committed against individuals and in most cases against groups like the corporations. It is always the responsibility of any corporation to make sure that the security and close functioning of all the company’s affairs are well overseen. This is in terms of the continuity, safety and the most importantly the security (Santanam, Sethumadhavan and   Virendra 2011). These crimes threaten the security of these companies and also their finances. The issues that are found in this mode of crime are like cracking, copyright infringement et cetera. For the corporations, governments and other non-state bodies that engage in these illegal actions, they always engage in espionage, financial theft and some other cross-border crimes (Santanam, Sethumadhavan and   Virendra 2011). According to Santanam, Sethumadhavan and Virendra (2011), in today’s world, things are much connected than before. For a corporation to be able to engage in its deals and make much profit it needs to have a reliable communication channel with the outside world. This raises the risks of falling into theft, fraud and other abuses that are committed in the cyber world where almost all communications are handled (Santanam, Sethumadhavan and   Virendra 2011). Therefore, there is crucial importance in understanding the different areas in society like politics and economy at a broader view because as the management of this corporation is becoming more and more reliant on the latest technologies, there is also becoming extremely vulnerable to the cyber attacks. Corporate security breaches These occur when the hackers exploit the employees through means of some social engineering and other scams (Cubbage and Brooks 2012). Since late eighties, computer crimes that have been politically motivated have been growing rapidly. These kinds of threats arise from the states and individuals or certain groups that are tired in some political agendas. These is clearly depicted or demonstrated as in 2007 cyber attacks against Estonia (Cubbage and Brooks 2012). There were enormous disruptions to the public services like banking services and some communicating services. The United Kingdom is one of the developed nations that depend on its own information infrastructure, as one mode of delivering world power both in the financial realm and political arena. The threat was realized in the year 2008, and it did not only center on the secrets of the state but also to the commercial and economic interests (Cubbage and Brooks 2012). Owing to these, companies like those that deal with finance, biological technologies and telecommunications had to be severely affected by the threats (Cubbage and Brooks 2012). The new report of 2011 from Privacy Rights Clearinghouse noted 535 accounts of breaches which was involving thousands and millions of highly sensitive records. Some of these breaches are not even reported, thereby leaving the figures to be more than these (Reynolds 2010). For example, Sony has also a number of breaches which arise from attacks that have compromised Sony online entertainment, Sony pictures in the midst of other websites. This company fell into a lawsuit because it had failed to protect over 100 million users’ records (Reynolds 2010). NASDAQ also faced a similar attack when some hackers breached the directors desk, and they were able to have access to the inside information, which they could sell to other competitors so that they can make enormous benefits in the stock market (Reynolds 2010). In May 2007, the international telecommunication union was able to launch the global cyber crime agenda. This was to address the growing concern of cyber security. This included experts from around the world. This clearly shows how the issue has become much of a threatening concern even to the governments. It forces the corporate to get information from politics and be able to contribute in the setting up of the global security protocols and international law that will help in governing the cybercrimes (Westby and American bar association 2003). Some insurance companies have risen to focus on cybercrimes. For example, the Lloyds, which has been in the leading front as an insurance company, has been issuing insurance cover for the cyber crimes (Westby and American bar association 2003). The different parties, corporations and nations have to sit down and adopt some of the legislation and other security measures that are necessary in controlling the cybercrimes. Some of the intelligent organized crime groups have taken considerable advantage of the recent new technologies, such as the internet, telecommunication gadgets, components and softwares to devise new ways of committing the crimes (Westby and American bar association 2003). These criminals are exploiting to a great extend the weakness that is found in technology, legislation and the lack of public awareness in the society. They have seen that an exceedingly large number of the society is not security conscious at all. These give them a lee way to steal fraud and commit other offences against these people because they do not have that knowledge of the latest inventions or technology that they can be able to protect themselves (Wall 2007). The cyber espionage is real but extraordinarily difficult to quantify. The real reason for this, to be the way it is due to the extreme difficulty in identifying the true source where the attack is originates. For example, a hacker who is located somewhere in Asia may use a computer system that is in Europe to be able to attack someone in America (Wall 2007). These diverse links are exceptionally challenging to inexperienced investigators, and they are often misled. On the other hand, it is extremely difficult to establish a motive that someone online had over somebody (Wall 2007). These criminal offences include; fraud, Customary Crime Cyber Crime Corresponding Fraud Online fraud, public sale fraud, progressive charge fraud Burglary/malevolent Damage Online hacking, defiance of examining attacks, viruses Child sexual category Offences Online child grooming, young person pornography websites Money laundering Online payment systems, e-cash Thievery ID offense, bank website ‘phishing’ and multimedia piracy Aggravation Cyber pestering, cyber bullying In Australia, it is estimated that these organized crime end up costing the country $10-15 billion every year. This is inclusive of the loss of business, tax revenue, society and community degradation et cetera. In order to be able to minimize the immense impact of these illegal actions, corporations, the government and other non-governmental bodies, have to raise the public’s awareness in matters that deal with their security in the cyber world (Wall 2007). In the period of 2008, undersized, average and outsized Australian businesses were analyzed on unauthorized use, damage, monitoring and assault or theft of their business IT. 14 % of those that were surveyed reported computer security incidents which amounted to a monetary loss estimated up to $649 million (Wall 2007). Breaches to private systems were only reported by eight per cent of victims which estimated cost of e-protection for their company to be up to 1.95 billion dollars (Wall 2007). Between the year of 2007 and 2008, malware detections rose ten-fold with a greater part said to be geared towards pilfering of identity information, secret code information or credit card information in a way to put together a large sum of money (Wall 2007). Impact of cybercrimes These kinds of crimes have a wide ranging devastating blow to corporations and nations. These may include ; loss of online business due to consumers losing their confidence in the latest digital economy, prospective for critical infrastructure to be compromised and in turn affecting water supply, health services, general communications, energy allocation, monetary services and transportation. In addition, victims may also loose fiscal resources and afterward go through losses in terms of time and effort, and disturbing emotional damage linked to the crime and businesses losing material goods (Tyson 2007). Furthermore, there will be increased costs to government agencies and industries that are of assistance in re-establishing credit histories, financial records and identities, as well as fuelling of other criminal movements and organizations increasing venture in time and assets by law enforcement (Tyson 2007). As it is one of the fastest rising criminals illegal activities, the Corporate have to extend their level of knowledge and expertise in dealing with the criminals. This is because the criminals are exploiting the high speeds, amenities and obscurity of the latest and highly technical technologies in order to commit different kinds of criminal activities (Tyson 2007). In order for the corporate to be able to curb and stop the illegal activities, it has to comprehend the systems in the latest technology, understand the society and further analyze PEST trends in the entire globe to have a clear view of the entire structure and framework of the macro-environmental factors that they are dealing with in their strategic management of corporate security (Tyson 2007). In the year 2002, the internet sustains a serious crippling after it was attacked. The 13 root servers that manage the internet address system failed. This was extremely devastating, and it led to massive looses to other businesses like Amazon.com, eBay, Yahoo and other e-commerce cites for some hours (Kuegah 2006). These attacks include attacks against computer data and systems, identity theft, supplying of child sexual abuse images, fraud, email scams like phishing et cetera (Kuegah 2006). The worldwide nature of the Internet has tolerated criminal activities to be committed in almost any illegal manner, anyplace in the globe, making it crucial for all nations to become accustomed with their domestic offline controls to cover up offenses carried out in cyberspace. The making use of the Internet by terrorists, mainly for recruitment and the provocation of radicalization, creates a serious threat to the states and international security (Larstan 2005). These threats have forced the corporate and governments to address the places with security vulnerabilities such as power plants, electrical grids, computer systems of government and other outstanding companies (Reyes et al 2007). The management of the corporate has to ensure that it works to keep up with the emerging threats. It has to promote the exchange of information among member nations through some form of regional working parties and conferences, offer some training courses that build and maintain professional standards, establish worldwide contacts who will be available all the hours for the cyber crime investigations. Furthermore, Develop strategic partnerships with other international organizations and private sector bodies and identify emerging threats and share in the intelligence with other member countries (Reyes et al 2007). The significance of the management of corporate security cannot be underestimated. The future growth and development of nations, governments, corporate, industries and other firms that relies significantly on this factors and the ability to secure their information (Reyes et al 2007). Developments in this globe are much faster than expected, and the impact that is seen later is going to take both sides good and evil. Some of the unwanted developments like terrorism, espionage and other crimes will take advantage of all the likelihood in the virtual world. The society is losing valuable information; money, ideas, innovations and private information every day and it may end up losing more in the years to come. Together, the corporate and other organizations can find a way to coordinate efforts, streamline their work and obtain best possible results to stop these crimes from happening (Reyes et al 2007). This is to be able to enhance trust and confidence to the society and contribute to a stable and productive community. The corporate have to have a good understanding of politics in terms of the manner in which the state is governed, the legislation and how certain codes have been formulated to govern the cybercrimes (Reyes et al 2007). Socially, the corporate have to form strong partnerships with law enforcement agencies, government departments and non-profit organizations. Bibliography: Cubbage, C. and Brooks, J., 2012. Corporate Security in the Asia-Pacific Region: Crisis, Crime, Fraud, and Misconduct. CRC Press publishers. Kuegah, F., 2006. Security Measures and Effective Corporate Information Systems Management: An Examination of Issues Surrounding Computer Network Security. Ann Arbor, Michigan. ProQuest publishers. Larstan, L., 2005. The black book on corporate security: cutting-edge guidance from the world's leading experts. N. Potomac, MD: Larstan Publishers. McCrie, R., 2006. Security operations management. Burlington: Elsevier publishers. Reyes, A., et al., 2007. Cyber crime investigations: bridging the gaps between security professionals, law enforcement, and prosecutors. Rockland, MA: Syngress Publishers. Reynolds, G., 2010. Information technology for managers. Boston, MA: Course Technology, Cengage Learning publishers. Santanam, R., Sethumadhavan, M. and   Virendra. M., 2011. Cyber security, cyber crime and cyber forensics: applications and perspectives. Hershey, PA: Information Science Reference publishers. Tyson, D., 2007. Security convergence: managing enterprise security risk. London: Butterworth-Heinemann publishers. Wall, D., 2007. Cybercrime: the transformation of crime in the information age. Cambridge; Malden, MA: Polity publishers. Westby, J. and Committee. International guide to combating cybercrime. Chicago, Ill.: ABA Publishers. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Management of Corporate Security (To what extent is it important Essay”, n.d.)
The Management of Corporate Security (To what extent is it important Essay. Retrieved from https://studentshare.org/management/1466843-the-management-of-corporate-security-to-what
(The Management of Corporate Security (To What Extent Is It Important Essay)
The Management of Corporate Security (To What Extent Is It Important Essay. https://studentshare.org/management/1466843-the-management-of-corporate-security-to-what.
“The Management of Corporate Security (To What Extent Is It Important Essay”, n.d. https://studentshare.org/management/1466843-the-management-of-corporate-security-to-what.
  • Cited: 0 times

CHECK THESE SAMPLES OF Corporate Security Breaches

Strategic Issues For Information Security Managers

The TechCrunch web site displayed a letter written by HackerKroll which went into quite a bit of detail about the information security breaches at Twitter, now known as Twittergate.... Most prevalent nowadays is the necessity of information security professionals to be on top of problems which deal with breaches of security.... In the paper 'Strategic Issues For Information security Managers' the author focuses on information systems, which are one of the key driving forces in information security....
9 Pages (2250 words) Essay

IPad's Security Breach

The author of the paper "iPad's security Breach" touches upon the idea of security of "iProducts".... As the text has it, controversy hit Apple's iPad or more specifically the iPad's cellular network, AT&T as a security research company, Goatse security pointed out a flaw in the security system.... Goatse security reported to Gawker that using a script available at AT&T's website, they were able to hack into the iPad and retrieve email addresses of possibly 11,4000 people including top celebrities, politicians, media personalities and also military personnel....
5 Pages (1250 words) Research Paper

Firewalls and the California Law on Security Breach

argued that if this law is not brought to force, security breaches will go on until that point business society will find the investment needed to implement the security system in the company being more than the cost of investment.... The objects of analysis for the purpose of this paper "Firewalls and the California Law on security Breach" are firewalls that can be defined as a security system that is used to control access in a company-protected area within the corporate network....
2 Pages (500 words) Research Paper

Entifying Information Assets, Threats, and Vulnerabilities in Top Information Security Breaches of the Decade

nsider INFORMATION security breaches A security breach or security violation is any occurrence that leads to un ized access of data, networks, services, devices, and/or applications by bypassing security mechanisms that exists.... In spite the advancement made in technology to prevent malware, it still ranks highly in information security breaches.... A security breach or security violation is any occurrence that leads to unauthorized access of data, networks, services, devices, and/or applications by bypassing security mechanisms that exists....
2 Pages (500 words) Assignment

An Analysis of Security Breaches and Incident Handling

This research paper presents a comprehensive analysis of some of the main aspects of incident handling in case of some security breaches.... This report has presented a deep analysis of some of the main aspects of security breaches and incident handling.... In this scenario, the author outlined some of the main aspects regarding prime ways along with types of security breaches those can happen in some business framework.... Then the author outlined some of the main procedures A privacy or security incident is an infringement, or an impending danger of a violation of an open or indirect security strategy, satisfactory utilization of policies, or standard privacy as well as security practices....
20 Pages (5000 words) Assignment

Data Security Breaches in Small and Medium Enterpises

The paper "Data security breaches in Small and Medium Enterprise" is a great example of a report on information technology.... The paper "Data security breaches in Small and Medium Enterprise" is a great example of a report on information technology.... There is a wide array of threats of data security breaches that SME's face today.... There are many other similar cases of data security breaches that have recently occurred with such large businesses and institutions as Tesco, eBay, The University of Connecticut Health Center, Nursing and Midwifery Council, and others (Ategrity....
8 Pages (2000 words)

Database Security Controls

However, we can see that with all the changes and innovations, the risk on security of the databases is a new challenge and constant concern for everybody in our time.... This paper also outlines the damage, the breach in the security in database can cause.... he aim of this research is to analyze the current attacks and to assess the security of corporate databases and the related issues which are increasingly becoming significant as enterprises are growing and considering the data they have stored in them....
12 Pages (3000 words) Literature review

How Is Information Made Secure and Why Is This Necessary

So many firms do not have clear mechanisms to detect security breaches and clear ways of responding to those breaches.... Most breaches of security of information arise from lack of effective security configuration, inefficient or lack of system administrators, lack of clear policies and positions by organizations on securing their information.... will begin with the statement that information security has a very important role in the role of privacy of the data....
7 Pages (1750 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us