Security Organization

College
Essay
Miscellaneous
Pages 6 (1506 words)
Download 0
Having been the flu season, last January we were forced to hire temporary workers for our call centre. All came highly recommended and were interviewed by the HR department. All temporary workers sat for an orientation session and their work duties were explicitly outlined for them…

Introduction

Later investigations revealed that it was an insider incident, involved the theft of subsequent selling of patients' credit card numbers, and that the activities emanates from the Call Centre. Having provided you with a general overview of the situation, I will now explain its potential and actual consequences, summarize the results of the post-mortem and clarify both lessons learnt and future action.
In regulating conduct related to the use of computers, the United States government currently defines a computer as "an electronic, optical, electrochemical, or other high-speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such a device" (United States Computer Fraud and Abuse Act (e)(l), 1984, cited in Kipper, 2007, p. 194). This definition accounts for the way in which IT has fused data storage, computing and telecommunications technologies and in so doing, touches upon the potential of both the computing and telecommunications technologies to violate the integrity and confidentiality of the stored data. ...
Download paper
Not exactly what you need?

Related papers

Assessment of Technology centric Strategies for information security in an organization
It is a "best practices" strategy in that it relies on the intelligent application of techniques and technologies that exist today. The strategy recommends a balance between the protection capability and cost, performance, and operational considerations." [National Security Agency]…
Security Planning and Assessment Essay
Adequate employee awareness and training are some of the most vital components of risk assessment and planning.…
Maritime Transportation Security Act
While the attacks focused attention on our aviation system's vulnerability, it became obvious that our maritime domain needed greater attention. Besides being gateways through which dangerous materials could enter, ports are attractive targets because they are often large and sprawling, accessible by water and land, close to crowded centers, and interwoven with highways, roads, factories, and…
Security Management Paper
The matrix is use to be able to provide equal opportunity to all the applicants on lawful job related and non-discriminatory criteria. A pre-designed tool was created by Texas Tech as a hiring selection matrix. The matrix composed of a spreadsheet, which helps to evaluate the applicant. The snapshot of the matrix is shown below (figure 1). To start with this matrix on the upper portion of the…
Security Managers Should Be Managers First And Security Specialist Second
Most companies are still far from having an elevated, coordinated security unit.…
Security Organization
Later investigations revealed that it was an insider incident, involved the theft of subsequent selling of patients' credit card numbers, and that the activities emanates from the Call Centre. Having provided you with a general overview of the situation, I will now explain its potential and actual consequences, summarize the results of the post-mortem and clarify both lessons learnt and future…
Information security legislation
Never the less, times have changed and the recent past has seen a lot of regulations and legislation which impacts information security. Some of these legislations are the European Data Protection Directive, Sarbanes-Oxley Act, and the Capital Adequacy Directive, just to mention but a few. In the event of these new compliance rules organization are being forced to resort a range of codes and…