Information Security Threats

Improved Essays
Creating and maintaining an effective information security apparatus has always been a challenging task for security experts. This is particularly true within organizations that process sensitive customer data such as financial and health related information. With IT (Information Technology) security strategy in mind, organizations have to devise strategies that would enable them to operate in a safe environment and protect customer data. Bill Stackpole & Eric Oksendahl in their book "Security Strategy: From Requirements to Reality", lists the nine principles that security strategists must take into account before finalizing the security strategies for their organizations. This paper will explain the following three principles.
Observation
…show more content…
However, mere detection does not provide the comprehensive analysis of the threats. Additional information such the origin and the intention of the threat are equally important. Moreover, a bigger attack could be preceded by small sniffing attacks to gauge the weakness in the security. Effective monitoring tools should be capable of detecting these forms of attacks, analyzing their intent and determine the scope of damage that could be caused in case of a security breach. Attacks such as DDoS (Distributed Denial of Service) target servers by sending large numbers of connection requests within a short span of time, which renders the server unresponsive. IT strategists should not only take into account the response in such events but how such attacks could be identified early on so that other backup systems could be made operational to service genuine requests. The observation principle also lays special emphasis on the identification of threats and the training of security analysts to detect suspicious behavior in the least possible time. Hackers typically do not repeat a particular style of attack again once it is used against an organization. Security analysts should be trained to detect newer and smarter forms of attacks as …show more content…
To thwart any attack, the security apparatus must be ready to deal with security challenges as they arise. Organizations usually miss this important point and lack effective coordination when there is a security breach. To mitigate any security breaches or attacks from within the organization, organizations could implement procedures such as maintaining an effective access control mechanism, encrypting sensitive information and implementing an authorized-only-device policy in the organization. Organizations could also carry out disaster recovery drills to understand the weaknesses in the security apparatus and identify the best course of actions in case of emergencies. The plans should be detailed enough to provide a comprehensive defense against an attack. Incident managers should be well versed with the emergency protocols such as coordination, information sharing and backup procedures that are necessary under such circumstances.
These principles provide security strategists the necessary guidelines to implement an effective security apparatus. With data security becoming one of the top concerns for organizations that handle sensitive customer information, it is important that security analysts look at the holistic picture of the security landscape rather than having a narrow scoped approach to protect and improvise their security

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    John Parachini Case Study

    • 790 Words
    • 4 Pages

    This paper will also relate the threat of this type of attack with the risk management perspectives…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Woodburn Graphics

    • 523 Words
    • 3 Pages

    Woodburn’s network security stance needs to evaluate the idea of a more secure network. The potential cost to resolve attacks has surpassed the network protection cost. In order to minimize costs of future incidents, the company may undergo the strategy of “Avoiding the risk,” by implementing more safeguards and information security or crisis management…

    • 523 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    PCI Compliance Paper

    • 555 Words
    • 3 Pages

    PCI compliance was first introduced in 1999 by Visa, Inc., in the form of the Cardholder Information Security Program (CISP). CISP was developed as Visa’s way to fight rampant cybercrime, which left credit card companies responsible for fraudulent purchases. (Search Security Staff, 2013) However, companies accepting credit transactions did not adopt the standards provided by CISP because they were quite different from the standards presented by other card companies like Discover, MasterCard, and American Express. In December 2004, the five major credit card lenders joined together to create a uniform set of standards called the Payment Card Industry Data Security Standard (PCI DSS).…

    • 555 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Security Scenarios

    • 492 Words
    • 2 Pages

    To support of this security posture the security team will integrate itself into the currently established security infrastructure by participating in command security team meetings and reporting directly to the Command Security Director (CSD) and appointed security investigators any security incidents or events that may occur. Additionally our security team will assist the CSD and Security Investigators queries regarding security concerns by providing requisite documentation and statements as necessary. Our security team will additionally support command operations by establishing direct communications with key personnel both within and external to the command to directly address security questions and concerns. Our security specialists will additionally develop a comprehensive set of procedures for establishing and maintaining accounts for SIPR and Joint Worldwide Intelligence Communications (JWICs) networks for command employees. These procedures will be documented in Standard Operating Procedures (SOP) which will be developed, maintained and regularly reviewed by our security team to ensure that it remains complete and relevant to command operations and will be published to the CSD, Security and resident staff as updates are integrated to ensure that they are cognizant of latest security processes, procedures, and documentation…

    • 492 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Recovery Planning

    • 443 Words
    • 2 Pages

    Hackers and other cybercriminals are taking advantage of security weaknesses within healthcare organizations infrastructure. They infiltrate the defenses of the network, encrypt the data and charge the healthcare organization a premium for the key to unlock and retrieve their patient data. Even more insidious are the recent attacks, such as NotPetya, where the hackers were not interested in ransomed, but rather to destroy the data of whatever organization they compromised. This white paper will help healthcare organizations understand the critical planning components involved in helping their organization to become more resilient to disruptions and adverse events, while maintaining compliance with the contingency plan standard outlined within the Health Information Patient Portability Act (HIPAA) Security Rule.…

    • 443 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    Moreover, cybersecurity is a critical feature that enables people to have confidentiality and derive strength from the fact that their crucial information stored in organizations and offices is safe. When it comes to security issues, security facilities and data is protected from access by intruders in the form of enemies, by use of cybersecurity…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    The authors reviewed information from government agencies, universities and health care institutions from different studies in both the United States and the United Kingdom. Upon evaluation for the studies concerning information security policies the authors determined Employees do not appear to have motivation to follow an organizations security policies. Which leads to the writings targeted purpose of determining the best methodologies used as control measures for security policy…

    • 744 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Implementation of policy Appropriate measures must be taken when using workstations to ensure the confidentiality, integrity, and availability of sensitive information, including protected health information (PHI). These measures must ensure that access to sensitive information is restricted to authorized users…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    7/A. P2: Explain the principles of information security when protecting the IT systems of organizations 7/A. P3: Explain why organization must adhere to legal requirements when considering IT system Security. 7/AB. D1: Evaluate the effectiveness of the technique used to protect organisations from security threats whilst taking account of the principles of information security and legal requirements. Principles of information security…

    • 1392 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Cenartech Case

    • 884 Words
    • 4 Pages

    One of the few saving graces was the IT manager’s awareness of the great need for standardizing backup procedures and related disaster recovery capabilities (Whitman & Mattord, 2011). This allowed the IT department to have the ability to recover almost everything that had been deleted or changed very quickly. The second saving grace was the firewalls between the different networks had prevented the attacker from connecting and causing further damage after being fired (Whitman & Mattord, 2011). Lastly, even if the IT manager was fairly new to this company, in two years it would seem he should he should have noted that employees were using the shared archaic, still-active accounts (Whitman & Mattord, 2011).…

    • 884 Words
    • 4 Pages
    Improved Essays