StudentShare solutions
Triangle menu

Insider Incidents - Essay Example

Not dowloaded yet

Extract of sample
Insider Incidents

A case study approach will be used because the focus will be on the Healthcare organization in which the researcher is employer.
Stephenson (2006) explains that there are various types of computer crimes and different categories of cybercriminals. The employee, or insider category of cybercriminals "tend to be disgruntled employees" who express their anger towards the company through cyber-vandalism (1). Their motive for cracking into the organisation's network, destroying data or vandalizing the corporate website invariably stem from their feelings of mistreatment or the assumption that they have not received their due appreciation and recognition. While as Stephenson (2006) asserts, it is not at all common from disgruntled employees to express their anger/dissatisfaction through acts of vandalism and cybercrime, it cannot be discounted either. The implication here is that employees are a potential threat to an organisation's network security and security mechanisms need to account for this threat through the adoption of safeguards designed to minimize, ideally eliminate, the opportunities available to employees for the engagement in cyber-attacks against their organization.
While Stephenson (2006) tended towards the minimization of the threat posed by employees to the computer and network security of their organization, numerous other sources argue that the threat is substantial. As early as 1991, Gilman indicated that the facts and figures on network security violations indicated that employees were often identified as the culprits, or as having, even unwittingly, acted as enablers. They do so through the misuse of the company's computer network and, more specifically, through the downloading of files which may contain viruses, worms and Trojan Horses (Gilman, 1991). Gilman's (1991) were confirmed more than a decade later by the FBI. A joint report issued by the FBI and the Computer security Institute indicated that the majority of network security violations suffered by U.S, corporations were either knowingly, or unknowingly, caused by insider misuse of the corporate IT system (Rola, 2002). Similarly, Symantec (2003) issued a report which stated that insider incidents accounted for over 40% of all computer and network security violations suffered by US companies and that while the majority of these incidents involved the unintentional compromising of the corporate network through system misuse, at least one-fifth of all incidents were deliberate (Symantec, 2003). On the basis of these studies, therefore, it appears that the prevalence of insider incidents makes it imperative that organizations institute mechanisms designed to control the employee-threat.
2.2 Internal Investigations
Most organizations have investigative procedures which are launched in the wake of a proven attack, or attempted attack. Kizza (2005) explains that upon the initial detection of an attack/attempted attack, it is difficult to organizations to immediately identify the source. They need to engage in trackback procedures to identify the source. Once they do, the IT department can begin to draw up conclusions regarding whether the attack was deliberate or random; how it was enabled; and whether the attacker was an insider or not. If their digital investigations reveal that the attack was enabled by employee misuse of the ...Show more

Summary

IT has significantly contributed to organisational efficiency and effectiveness. Indeed, in this information age where companies deal with volumes upon volumes of data every single day, it is difficult to imagine the possibility of doing so with any measure of efficiency in the absence of computer and information technologies…
Author : balistrerimered
Insider Incidents essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Insider Incidents"
with a personal 20% discount.
Grab the best paper

Related Essays

Business Ethics issues involved in insider trading
e act is illegal under the laws of the United States. According to Hough, insider trading is highly prevalent in the United States because trade data support the said interpretation on insider trading prevalence in the country. For example, according to Hough, “back in 1974, a paper published in the Journal of Financial Economics showed shares of the average takeover target beat by 14% over seven months prior to the announcement” but last May 2011, “a study published in the Journal of Multinational Financial management found abnormal returns of nearly 7% during the 50 trading days before deal announcements.” The situations identified by Hough are only possible if there insiders in the
6 pages (1500 words) Essay
Incidents
Name: Course: Tutor: Date: Incidents is a text that describes the life of a slave girl from her own perspective. It functions in several important ways when re-imagined as a transcultural or autoethnographic text. One of the most important things in Linda’s life is her family, something that crosses cultural boundaries, and creates a sense of continuity between all of the cultures that surround her situation – family is the thing that shapes her life more than anything, and it is easy to imagine the ways that these ideals of family would cross cultural boundaries even in her time.
5 pages (1250 words) Essay
Potential Forensic Techniques For Investigating Insider Attacks
Insider attacks occur when a user of an organization uses an unauthorized system to find information about the organization. In order to do this, the user must counter the computer security system and the forensic techniques used by this system. Attacks done by inside users has proven to be more costly and harmful than the attacks done by outsiders as the inside users have more information about the internal processes of the organization and they also have an access to various resources of the organization.
2 pages (500 words) Essay
Critical Incidents
The significance of educational institutions in the society cannot be undermined as they educational institutions are basic requirements of the society. However, the teaching practice is faced with numerous challenges. The practice depends on the indulgence of tutors to effectively educate scholars.
18 pages (4500 words) Essay
Insider Trading
It is considered so important because this type of security transaction, insider trading, can potentially harm individual investors, industries, and a country's business reputation. This is a truly global issue. Insider trading is defined by the United States Securities and Exchange Commission as "buying or selling a security, in breach of a fiduciary duty or other relationship of trust and confidence, while in possession of material, non-public information of the security" (2006).
2 pages (500 words) Essay
Insider/Outsider Problem Of Religion Interpretation
1 It reveals the magnitude of the insider/outsider problem in understanding, interpreting and studying the religions. From the critical perspective, being a practitioner of a religious belief or an insider can be considered as an obstacle to critical reception and analysis of religion, because it adds subjectivity and effectively eliminates objectivity and reasoning from the analysis.
4 pages (1000 words) Essay
FINAL REPORT
At the same time, these same technologies have rendered organisations vulnerable to insider and outsider attacks. This report will focus on the role which organisational employees play in compromising their workplace’s
22 pages (5500 words) Essay
2000 notional key incidents
In addition, NQT induction leads to high improvement in teaching-learning process within an institution. The impact of the induction year on classroom practice is high and helps the individual teacher to
8 pages (2000 words) Essay
Insider Trading
However, the last three decades have witnessed enactment of several complex federal laws effectively prohibiting insider trading with regulations being at the epicenter
2 pages (500 words) Essay
Insider threart
Given their social relationship with other employees in the organization, there is a possibility that they may even be willing to choose to
1 pages (250 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation