Secure Computer Security

Improved Essays
My scenario takes place at a banking facility in a local town. I call it the Western bank of West Virginia. Protecting information uses the same principals as protecting your personal belongings. Would one leave their house unlocked when they left for a week’s vacation? You keep your personal belongings out of others reach by locking them up or hiding them in a safe place.
Computer security is important to an Information system to ensure the Confidentiality, Integrity, and availability is not compromised. There are many ways to secure a computer based information system. The most important way to secure the system is to physically secure it. When securing a system it is advantageous to use layers of defense. If the outermost layer
…show more content…
Risk must be dealt with in various ways. The principal of least privilege is a principal that is used and it involves restricting access to only those that truly need it. User Account control (UAC) is a tool used in Microsoft to only allows software that is approved by an administrator to be installed on a local host computer. Securing a network requires that a risk assessment be completed. This will direct the administrator as to what needs to be done to secure the information and the system. Less vital or crucial data may not need as much protection as the types of data like account numbers, and trade secrets. You must follow the laws that govern you business. In a bank there may be data that can’t be disclosed to the public until it is reported. Insider trading is a type of unethical practice that is illegal. If your information is not protected from this type of disclosure it can lead to prosecution of your firm. Taking steps to keep confidentiality of information is extremely important. Corporate espionage is unethical behavior but it does still exist and happen. Security as a service is also an option. Companies offer services to customers the help with security. ADT2 is a company that specializes in security as a service. If your company decides to entrust their informational security needs to an outside source their trade secrets are also in the hands of the company that supplies the service. This is an option that will need to be evaluated before entering into using an outside source to secure your computer based information

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Logical security : Logical security consists of software safeguards for an organization's systems including user identification and password access, authentication, access rights and authority levels. These measures are to ensure that only authorized users are able to perform actions or access information in a network. Access control mechanism: As part of access control mechanism we are using MAC (mandatory access control mechanism) where users do not enjoy the privileges of deciding who can access their files. Here the operating system is the decision maker overriding the user’s wishes.…

    • 345 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Task 2 (P2) Describe the following physical security measures and explain how they may be used to help keep systems secure. • Locks Locks are physical security measure that can be used in different aspect within the company. The locks can be put on the door to avoid people who not supposed be in the building or employees who not supposed be on that room. There are different types of locks that can be used within the company such as Password locks that be put on the doors, this will avoid anyone coming to room without password identification to enter the room. Also the company can use ID IDENIFACTION on the door so any employees comes have to use their ID in order to enter the building, this will…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    1.02.01 Warning Banner

    • 567 Words
    • 3 Pages

    Sub section 9.1.02.01 – Warning Banners Current Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers,desktops, VPN connections, network devices). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government regulations and UnitedHealth Group directives. Modify Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers, desktops, VPN connections, network devices, application elevations). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Criteria should be developed on who has access to what information, and appropriate technical safeguards should be put into place, so information is only…

    • 614 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    Data Confidentiality: When you keep important data it is important that the data doesn’t go out to the wrong hands. So if a business data is suddenly leaked online or maybe stolen, then this can result in a huge loss for the business and this can potentially put the business out of business. To overcome this problem, then you would need a good security program which can safeguard against any breach in confidentiality. Data Integrity: This is used to ensure that the most important data is secure and also makes sure that the data isn’t messed around with. If any of the data has been messed around with then this can result in major problems.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    The security systems will be focused on management security, operational security and technical security controls. Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management. Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Images can be used to hide information from programmers. And finally, be careful when getting rid of old machines. These three things are important to note when trying to keep your personal information…

    • 607 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    3) To keep confidential the password given to you to access the resources and information systems of the organization, informing immediately to the Network Administrator or any other responsible personal if any issue surge related to your password privacy. Your personal password is to be kept confidential and it is non-transferable. DO NOT share your password with anyone. 4)…

    • 1019 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    These safeguards include access control, audit controls, integrity controls, and transmission security (HSS.org). Access control requires a covered entity to implement policies and procedures to restrict a certain level of individuals from obtaining technical access to the electronic information. Audit controls must be implemented including but limited to hardware, software, and procedures to examine the access of electronic information and ensure the information is…

    • 1427 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Why Collect HR Data

    • 1110 Words
    • 5 Pages

    Data Protection Act This act applies to all organisations that process data relating to their staff and customers. It is the main legal framework in UK that protects personal data. The act contains 8 data protection principles which are: Personal data should be processed fairly and lawfully, this can be achieved by asking the employees to use their information, on the employment contract.…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    This way you can minimise the dangers and prevent loss of more money. Phone fraud Even though banks often warn that they will never ask for personal details other than in person, a large part of identity fraud is still connected with information exposed over…

    • 194 Words
    • 1 Pages
    Decent Essays