StudentShare solutions
Triangle menu

Security Organization - Essay Example

Nobody downloaded yet

Extract of sample
Security Organization

Later investigations revealed that it was an insider incident, involved the theft of subsequent selling of patients' credit card numbers, and that the activities emanates from the Call Centre. Having provided you with a general overview of the situation, I will now explain its potential and actual consequences, summarize the results of the post-mortem and clarify both lessons learnt and future action.
In regulating conduct related to the use of computers, the United States government currently defines a computer as "an electronic, optical, electrochemical, or other high-speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such a device" (United States Computer Fraud and Abuse Act (e)(l), 1984, cited in Kipper, 2007, p. 194). This definition accounts for the way in which IT has fused data storage, computing and telecommunications technologies and in so doing, touches upon the potential of both the computing and telecommunications technologies to violate the integrity and confidentiality of the stored data. The United States Department Of Commerce (2000) highlighted this threat in its report on the proliferation of computer use and internet access, not just in the United States but, across the world. As the greater majority of corporations, both in the United States and worldwide, are relying on IT for data storage and processing, increased popular access to IT renders corporate systems vulnerable to unauthorized penetration and the associate accessing of private and confidential data (U.S. Department of Commerce, 2000). While it is the responsibility of corporate entities to ensure the securitization of their networks, absolute inviolability is practically impossible to achieve. It is, thus, that recent years have witnessed the ever-increasing adoption of computers in the commission of crimes of fraud and theft (Power, 2000). Our company has recently fallen victim to one such incident.
3 Incident Overview
On January 16th, 2008, a periodic review of our IT activities logs evidenced a string of unusual activities. Almost 10,000 patient files had been accessed and the data they contained had been transferred to an external medium, possibly an external hard drive. The IT department had no record of authorizing any individual this level of access and, indeed, there was no legitimate justification for the access of 10,000 patient files. The incident was terribly worrisome as these files contain sensitive data such as patients' social security, insurance and credit card numbers, not to mention home and place of employment addresses and contact information. The IT department immediately contacted the Legal Department and appraised its Director of the situation who, in turn, contacted law enforcement and did the same.
4 Post Mortem
After reporting the incident to the Legal Department and law enforcement officials, the IT department launched an intensive post mortem investigation. The investigation, which followed standard procedures which will be described shortly, had several objectives. These were the identification of the source, as in whether it was an insider or outsider incident; ...Show more


Having been the flu season, last January we were forced to hire temporary workers for our call centre. All came highly recommended and were interviewed by the HR department. All temporary workers sat for an orientation session and their work duties were explicitly outlined for them…
Author : vbaumbach
Security Organization essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Security Organization"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Public Policing Versus Private Security
The public police lack appropriate resources to deal with such crimes, since they have to stick to their budget, and as a result, private security has emerged and is increasing. Private security guards are commonly hired by entrepreneurs to guard the business from theft; in such a scenario, the police are not required, in countries where local mafia is present firms prefer hiring private security, (De Melo & Ofer 1994 p40).
6 pages (1500 words) Essay
Assessment of Technology centric Strategies for information security in an organization
Information Assurance is the confidence that information systems will protect the information they handle and will function as they need to, when they need to, under the control of legitimate users. "Defense in Depth is a practical strategy for achieving Information Assurance in today's highly networked environments.
3 pages (750 words) Essay
Security Management Paper
Choosing the right personnel for the position is tiring and time consuming. Because of these, several hiring selection matrix are being developed to help employers to choose the appropriate person for the job. With the help of the hiring selection matrix the employer will be able to compare the applicants more accurately and objectively.
8 pages (2000 words) Essay
Security Management Paper
to deal with privacy issues in conducting surveillance and intelligence gathering, analyzing a budget for a security organization, and the policy and procedures for dealing with issues such as sexual harassment, discrimination, physical security, and personal
5 pages (1250 words) Essay
Information security legislation
Organization currently need standards, in the past many organization mostly tended to use a single information security standard for example BS 7799 part 2 (an
19 pages (4750 words) Essay
Homeland Security Organization
Current terrorist attacks lead one to think about the drawbacks of original homeland security. One of the most significant inadequacies of original homeland security
1 pages (250 words) Essay
Homeland Security Organization
It was published on February 1st 2005 in the Journal of the American Society for Information Science and Technology, Volume 56, and Issue 3. The above mentioned article does have a clearly stated research question – “Do the
6 pages (1500 words) Book Report/Review
Security within Your Organization
CIA (Confidentiality, Integrity, and Availability) Triangle is a renowned and respected Information Security benchmark that is widely adapted by
3 pages (750 words) Essay
It is therefore significant that security is assessed in different contexts. In their examination of the origins and development of security in medieval England Fischer et al (2008) indicate that throughout history the concept of security can be traced to
7 pages (1750 words) Essay
Organization of Security Plan
Cyber-security has become an important part of every organization catalyzed by the ever-rising cases of attacks by hackers whose intention is to jeopardize operations for
3 pages (750 words) Essay
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
Comments (0)
Click to create a comment
Contact Us