Information system

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 20 of 50 - About 500 Essays
  • Improved Essays

    application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks. After analyzing the current situation of accounting firms, it seems that this organization understands the importance of information security but it is severely lacking. This requires…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    With massive data breaches populating the headlines in recent years such as the recent breaches at Target and Home Depot, healthcare institutions are actively strengthening their arsenal against threats to patient history information (PHI). According to the Identity Theft Resource Center (ITRC, 2015), data breaches in healthcare accounted for 44 percent of all breaches in 2013, and that is expected to only inflate each year. A data breach is an incident when confidential data has been stolen…

    • 478 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    their customers a constant concern which remains will be how to protect the information. Due to rise in traffic on these networks, the compromise of networks has also increased which raises the concerns of how the information will be protected in the future. Another way to define a compromise is known as hacking which is the task of taking over a targeted…

    • 938 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Social Engineering Essay

    • 1422 Words
    • 6 Pages

    of Malicious Communication Defining Social Engineering Social engineering is defined by Berti (2003) as “the criminal art of tricking staff into revealing corporate information.” Social engineering can take place on various levels, and for various purposes. Social engineers can target other individuals and extract enough information to steal their identities (Brower, 2010). They can also use social engineering to perform reconnaissance on an organization, gaining critical knowledge to plan a…

    • 1422 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    contract that have to be followed in order for Security Works, Inc. to stay compliant to all laws and security measures falls under the Federal Information Security Management Act (FISMA). FISMA is United States legislation that defines a comprehensive framework to protect government…

    • 1874 Words
    • 8 Pages
    Improved Essays
  • Great Essays

    4. Risk Management Challenges in a Telco environment 4.1. Background Today, mobile phone, cable TV operators and Internet service providers have the tendency to disappear as independent/individual service providers. The market tendency is to provide all services in a single service to prime clients. Major market players are consolidating their services by expanding already existing areas, by creating new areas from ground up or by acquisition of already existing companies that bring technology…

    • 1280 Words
    • 6 Pages
    Great Essays
  • Great Essays

    The goal of an APT is to gain access into the power grid network and collect as much information as possible. They use the exfiltration techniques that allow them to transfer sensitive information to their data-miner area also know as Command and Control Center. It is important for the APT to mask the data to resemble normal network traffic so that it detection can be made difficult or almost impossible (Cruz, 2013). Method for data exfiltration includes: Backdoors: This method used by the…

    • 1307 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks. Hacking can lead to theft of important information which can be sold to other competitors.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    Background The expansion of the Internet and availability of information online has lead to an equivalent expansion in cyber crime, or cyber terrorism. In fact, in 2013 the Office of Cyber Security and Information Assurance reported that “93% of large corporations and 87% of small business reported some form of cyber breach in 2012” (Brewer, 2014). Also, President Obama labeled cyberthreats as an incredibly serious economic and national security challenge (Artlisch and Edelman, 2014). Cyber…

    • 1096 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    This summer, I interned for Stonegate Mortgage Corporation’s Information Technology Department, located in Carmel, IN. During the duration of my internship I was exposed to things I had not experienced from my prior internship at Pacers Sports and Entertainment, nor from classwork at Butler University. Overall, the experience at Stonegate Mortgage has been a positive one, filled with mistakes I learned from; the primary lesson learned during the internship was that some projects may seem perfect…

    • 1089 Words
    • 5 Pages
    Improved Essays
  • Page 1 17 18 19 20 21 22 23 24 50