China's Security System

Improved Essays
Security; being free from danger and threats, has existed as a humanistic desire for as long as humans felt emotions. Obtaining a sense of security was the driving force behind China’s Great Wall. It curated the creation and growth of all the great armies of the world. It is why we pay hundreds of dollars a year to have our houses monitored, our cars insured, and our families protected. It is also why businesses spend millions of dollars to keep their personal and customers’ information safe. However, as history reveals over and over again, even the greatest security features fail. The Mongols were able to invade Northern China, houses are constantly broken into, and customer information is always being stolen from major corporations. While …show more content…
In the study conducted by Susanto, Almunawar, and Tuan (2011), since “there is no single formula that can guarantee 100% of information security,” there must be standards set to establish a viable level of security within an organization (p 23). These standards also help the organization in ensuring there is a proper allocation of resources and that best technical practices are utilized. In following various guidelines used to create and manage security (CIS, ISO, NIST, SANS, etc.), an organization must implement various policies pertaining to security, protect the physical assets of the organization, be prepared for internal and external incidents, allow for new development and phases, and implement training and awareness for its personnel (Behm, 2003, p. 7). By following these standards, an organization is able to get a better understanding of all the facets of their information security department by having a verbatim outline of all the features. These guidelines also allow for constant development and growth so any changes within the organization can easily be applied to the security …show more content…
The employees of an organization have a vital role in the success of a security program for multiple reasons. Primarily, the employee’s will me be the ones who utilize the company’s technology on a day to day basis. This not only gives them the highest risk of failure in abiding to security policies and protocols, but also makes them a major target for the attackers trying to infiltrate the organization’s systems. Sasse, Bronstoff, and Weirich (2001) found that “in many of the reported cases, user behaviour enabled or facilitated the security breach”, which has been linked to the growth of security problems over the years (p. 122). This data, along with various other instances of human error, has led many to the conclusion that a complex and cogent security system is no longer satisfactory. Many practiced security procedures, such as network firewalls and 2-step user identification, while successful in theory, fail because of the incompetence of the end

Related Documents

  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Robert Hanssen Failure

    • 1219 Words
    • 5 Pages

    Creating and designing policies and procedures geared towards being able to document and look back on security violations that have been reported is going to be a crucial step in this process (Office of the Inspector General Oversight and Review Division, 2007). Until filing this report, there was not a concrete way of doing it. Some tools that are in use today started from this report. An example of such tools is a financial disclosure program where annually FBI employees must disclose their finance records for review. This will give the FBI the opportunity to look for any discrepancies or sudden influxes of…

    • 1219 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The family’s paranoia for security was detrimental. They ruined a happy life, because they were distracted by security. This is ironic, because one would think that adding more security would make one feel safe. However, in this short story that statement is false. Too much security can be harmful.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The vulnerability of Security Security is a very important thing to people. If people don’t have security they lose a sense of comfort. In House on Mango Street by Sandra Cisneros and “What Security Means to Me,” by Eve Ensler both show security and what it means to them in their eyes. Security helps people get through daily life easier than without it. When people do not have security they become lost.…

    • 639 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Late Modernity Analysis

    • 728 Words
    • 3 Pages

    The criminal justice system is influenced by many factors, one of the most important being society (Kraska 296). Late modernity makes sense of criminal justice behavior by situating the criminal justice apparatus within larger social, cultural and political contexts (296). This orientation has as much to do with understanding the times we live in, as with understanding the criminal justice system (296). Late modernity also places a premium on understanding the entire landscape instead of focusing primarily on the criminal justice system (296). This broader focus allows for policy creation that benefits society and the criminal justice system.…

    • 728 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Airport Case Study Essay

    • 1114 Words
    • 5 Pages

    First, potential threats can be recognized early by identifying anomalies in access behavior. Moreover, the usage of both the video surveillance and an integrated database could provide early warning of any potential threats. Second, the software integrated with all leading PACS, training systems, TSA mandated background check processes and other airport specific IT systems, forced the disparate systems to act like a single unit which in turn made sure that the information was accurate. Finally, reduction in delays of credential processing due to process automation and integration, will result in improved employee productivity as well as increased customer satisfaction due to low support…

    • 1114 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Security Metrics

    • 532 Words
    • 3 Pages

    Problems in developing security metrics efforts include the Trusted Computer System and the Security Systems Engineering Capability Maturity Model. These agreements have met with limited success. Their opinion suggests some key factors that need to be addressed by safety…

    • 532 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    If identity and security authorization with compromised credentials being a significant enabler in successful attacks. Organizations are required to implement reliable…

    • 1456 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Cybersecurity Policy Paper

    • 1062 Words
    • 5 Pages

    Introduction In today’s technological society it is very important that organizations maintain strong security policy documentation. The most important documentation that should be maintained is the cybersecurity policy. In this paper I will discuss the cybersecurity policy of the organization I have chosen (Apple INC). This paper will supply an analysis of the strategy that they use to protected themselves against fraud, hackers and theft.…

    • 1062 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Similarly, safety measures can only protect Americans so much. In the events of 9/11, safety measures would have done very little to protect the lives of people lost. Even with the National Security Agency (NSA), the event would have been nearly impossible to defend against. The NSA continually intrudes on privacy and limits freedom, yet has minimal to zero success in protecting Americans. The inability for America’s top specialists to protect…

    • 559 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cost Of Freedom

    • 567 Words
    • 3 Pages

    Security is provided for the people’s protection, but is it taking away the freedom from the citizens? In economics, one will study the opportunity cost of each decision made. An opportunity cost is that “ Most desirable alternative given up for the decision”, which is freedom in this case. The world is so desperate for protection, they don’t realize they are giving up their freedom. In economic class, we learn that when one product is increasing, the other product decreases.…

    • 567 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    However, this “age of security” has become tantamount to saying “age of anxiety,” as the need to feel secure demands constant vigilance, wakefulness, and surveillance. Although at first glance security presents itself as a positive concept – a state of safety, peace of mind, confidence – a closer examination of its implications in society reveals the simultaneous negative…

    • 1991 Words
    • 8 Pages
    Superior Essays
  • Superior Essays

    1. A brief summary of the range, contents, and argument of the article. As we tried to answer the question #2 of case study 1 – SPE Breach: The Hack of the Century, “Discuss why despite substantial investments made by at the past, Sony still suffers security weaknesses?” (Bechor, 2017), this article by Julisch (2013) attempts to answer the similar question, “why despite substantial investments, there are still major security weaknesses in today’s information systems” by identifying the four anti-patterns and by suggesting how to overcome the anti-patterns.…

    • 1505 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    Organizations posses a lot of information, including strategic plans, trade secrets, cost information, legal documents, and process improvements. Of course, preserving the confidentiality the organization’s intellectual property is the basic objective of information security. Protecting the privacy of their customers’ information is also equally important. That means a company and its management team is also responsible in protecting confidentiality and in implementing privacy controls. If they fail in these roles as well as the roles enumerated above, they should be held accountable for the failure or for the successful attack made on their AIS.…

    • 1545 Words
    • 7 Pages
    Superior Essays