Information Security Research Paper

Great Essays
Human Dimensional Impacts upon Information Security Infrastructure
William Fisher
University of Maryland University College
CSEC610 Cyberspace and Cybersecurity
Professor Hall

Abstract
Evaluating the vulnerabilities of an organization’s information security starts with the risk assessment. The process includes the method performed and current protocols to both measure the risk involved and address attacks. Typically, businesses will have a network tailored to their particular needs balancing cost and need. All the technological tools commercially available can build a commanding network that contains the latest hardware and the most sophisticated software; however, those systems have but one unpredictable fault, the human factor. This paper
…show more content…
A well-planned and assembled platform can be the key to current success and future growth. The network is a careful balance of digital needs and innovative technology ultimately forming the foundation that is a business’s telecommunication architecture. Social engineering is the technique of manipulating individuals, so they inadvertently undermine personal or corporate network security. Social engineering has become increasingly popular among criminals based upon human vulnerability exploitation. It is easier to take advantage of people’s natural tendency to trust rather than traditional hacking methodologies to gain access to the system or information sought …show more content…
In particular, their training should incorporate terminal learning objectives that include identifying deceptive patterns and suspicious forms of socially engineered attacks. Additionally, managers should individually receive training towards a skill set that nurtures reducing the stress in the work environment. Managers may sabotage their efforts and be subject to push back from employees who regard network security compliance and hindering both job performance. For example, the company should allocate both time and resources for to satisfy any requirements of information security compliance (“Unintentional Insider Threats: Social Engineering,"

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    After analyzing the current situation of accounting firms, it seems that this organization understands the importance of information security but it is severely lacking. This requires to introduce a user training program to make every employee understands the importance of how they behave themselves every day in protecting the company’s network…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In 1776 the founding fathers signed the Declaration of Independence to free themselves from the tyrant King George of Great Britain. This caused a war of independence that freed the people of the United States from an unfair government, but left them in need of leadership. After several failed attempts the leaders of the new nation formed a government that would be free from tyranny. The Founders wrote the constitution to limit the powers of the government to insure that the government would not create a new tyrant.…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The National Security Agency (NSA) has collected and analyzed the contents of emails, text messages, and mobile and landline telephone calls from nine Americans for every one foreign person it has targeted. Their main mission is “preventing foreign adversaries from gaining access to sensitive or classified national security information. ”(https://www.nsa.gov/about/mission/) To simplify, the initial mission was to keep America safe from the foreign. They’re responsible for the protection of U.S. government communications against mainly the ‘outsiders’.…

    • 607 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    How do you feel about immigrants coming to the United States? I believe that the US should not increase border security because there are immigrants are escaping war and poverty and so they come to the US to live a better life. There are a lot of reasons I feel that the US should not increase border security like presumption of danger, border militarization and more. The immigrants that come from countries that have war like Syria to the US, just want have a better, safer life.…

    • 451 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nearly everyone has deleted their web history in the past just so others cannot view what they have done. Deleting our history on the internet is a way we protect our privacy, but this method of keeping personal may not help people stay private. Privacy is something that is very important and something that everyone has in common, but in the past few years that privacy barrier has been broken multiple times and the freedom of keeping secrets has been taken away. The National Security Agency (NSA) is an agency that hopes to protect the U.S. secrets, and outwit their opponents in data superhighway, while at the same time protect the privacy rights of the American people (“What We Do”). The NSA is supposed to help the American public stay safe,…

    • 1710 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    Abhinandan Yadav Professor Sharifian Govt-2306 April 29, 2018 Assignment-3 If I would be elected then I would like to serve in the committees of Homeland security and public safety or transportation or Higher education. The function of these committee are described below. 1. Homeland Security and Public Safety:…

    • 940 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Hello Everyone, I hope everyone had a good first week. I apologize for the delay on my initial post. This week we are discussing the concept of homeland security in relation to homeland defense and national security. The term homeland security and the concept of national security has been prevalent in the United States since the terrorist attacks along the East coast on September 11th, 2001.…

    • 479 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Vulnerability of IT Infrastructures: Internal and External Threats Sylvester Ngoma Ph.D. Candidate Information Technology Educator March 04, 2012 Vulnerability of IT Infrastructures 1 Introduction The pervasive and complex nature of security threats to Information Technology (IT) continues to be a major concern for modern organizations and businesses. IT infrastructures, which have become the cornerstone of organizational management, are highly vulnerable to potential attacks and sabotage. IT vulnerabilities may be attributable to internal and external sources (McNamara, 1998; Yeh and Chang, 2007).…

    • 4254 Words
    • 18 Pages
    Superior Essays
  • Great Essays

    These malicious users began using a technique called social engineering to infiltrate into places they were not allowed into. So what is social engineering when defined in a technology environment? Hadnagy defines social engineering as the art or…

    • 1496 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Insider Attack Essay

    • 564 Words
    • 3 Pages

    Although in today’s media we hear a plethora of reports regarding hackers and attacks on government agencies, multi-million dollar organizations and small business; it’s rarely brought to our attention that many compromises are made possible by insider threats. Without a doubt it is instantly assumed that a majority of insider attacks are intentional; however, it’s the unintentional insider threats that pose a bigger danger to security. Why is the unintentional insider threat a bigger threat? Because more than likely, the user is unaware they are the threat and/or are not well trained and are more likely to repeat their poor security habits. Also research has shown working long hours and multitasking are red flags for risk” ("Survey Finds Employee…

    • 564 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays