Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Rewrite this file in professional way and good expression

the rewrite must depend on the understanding the whole paragraph and then make the rewriting

don't use sentense by sentense rewrite

must be zero plagirisim

3 Pages

Information security

Information security (infosec) is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information. Infosec responsibilities include establishing a set of business processes that will protect information assets regardless of how the information is formatted or whether it is in transit, is being processed or is at rest in storage.

Infosec programs are built around the core objectives of the CIA triad: maintaining the confidentiality, integrity and availability of IT systems and business data. These objectives ensure that sensitive information is only disclosed to authorized parties (confidentiality), prevent unauthorized modification of data (integrity) and guarantee the data can be accessed by authorized parties when requested (availability).

Many large enterprises employ a dedicated security group to implement and maintain the organization's infosec program. Typically, this group is led by a chief information security officer. The security group is generally responsible for conducting risk management, a process through which vulnerabilities and threats to information assets are continuously assessed, and the appropriate protective controls are decided on and applied. The value of an organization lies within its information -- its security is critical for business operations, as well as retaining credibility and earning the trust of clients.

Threats to sensitive and private information come in many different forms, such as malware and phishing attacks, identity theft and ransomware. To deter attackers and mitigate vulnerabilities at various points, multiple security controls are implemented and coordinated as part of a layered defense in depth strategy. This should minimize the impact of an attack. To be prepared for a security breach, security groups should have an incident response plan (IRP) in place. This should allow them to contain and limit the damage, remove the cause and apply updated defense controls.

Information security processes and policies typically involve physical and digital security measures to protect data from unauthorized access, use, replication or destruction. These measures can include mantraps, encryption key management, network intrusion detection systems, password policies and regulatory compliance. A security audit may be conducted to evaluate the organization's ability to maintain secure systems against a set of established criteria.

Jobs within the information security field vary in their titles, but some common designations include IT chief security officer (CSO), chief information security officer (CISO), security engineer, information security analyst, security systems administrator and IT security consultant.

A Brief History of Computer Security Threats

The headlines offer up a grim picture: major corporations getting hacked, revealing personal information about tens of millions of customers; bugs exploited in millions of servers; foreign nations spying on others by stealing passwords and email addresses. It's enough to cause more than a few headaches. Security threats are nothing new, but these days they appear to be causing far more damage than ever before. While the methods have changed, attackers still aim to cause as much damage as possible. A look at a brief history of computer security threats shows the evolution of the risks and hazards.

Computer Threats

Viruses and worms were the next big cyber culprits, though they were at first harmless. For example, the first worm was developed in 1979 at a Xerox research station; its goal was to actually help make more efficient computers. Later on, hackers took the worms, modified them, and began using them to destroy or alter data.

Eventually, the first PC virus named "Brain" was developed in 1986, but it was not destructive in nature. In fact, the men behind it actually included their names and contact information buried within the code. More harmful viruses eventually followed, including "Form" and "Michelangelo." Self-modifying viruses were first created in 1990, but rapid infection rates didn't take off until several years later.

Rise of the Hackers

Starting in 1995, viruses were spreading at an alarming pace, starting with the first Microsoft Word-based virus. Eventually, hackers took centerstage. In 1998, an incident known as "Solar Sunrise" occurred, where teenage hackers gained control of hundreds of computer systems used by the military, government, and private sectors. Two years later, other hackers used distributed denial of service (DDOS) attacks to shut down Yahoo, eBay, Amazon and others. In 2001, the Code Red worm was unleashed, infecting tens of thousands of systems and causing around $2 billion in damage. The harm brought about by hacking was becoming very costly.

Increase in Infections

More viruses continued to spread over the following years. In 2006, up to one million computers were infected with the Nyxem virus, which was spread through email attachments. The Storm Worm virus accounted for 8% of all infections only three days after it was released. Other worms and viruses quickly spread-the Koobface virus (spread through email and social media), the Conficker worm (millions infected), and the Stuxnet virus (in development for ten years).

Millions Infected, Billions Lost

Problems continued to spread all over the world. The Heartbleed bug was discovered in 2012, giving attackers access to passwords, communications, and sensitive data. Millions of servers were infected due to this bug. In 2013, hackers were able to infiltrate Target's servers, stealing the personal information of 70 million customers. The cost of the data breach is estimated to be more than $200 million. A few months later, 81 million Yahoo email customers became the victims of cyber criminals. Auction site eBay was likewise hit with a breach, forcing the company to advise its 145 million customers to change their passwords. More recently, Home Depot reported a breach that may end up being the largest computer network breach that a retail company has ever experienced.

It's now a common sight to see a business report a large data breach. According to some of the latest statistics, more than 200 new viruses are being discovered every month worldwide. For this reason, businesses are making security a higher priority, whether it becomputer, IT, or network security. With so much sensitive data now going onto the internet, customers are also urged to use more caution and take preventative measures to secure their information. As this look at the history of computer security threats shows, the need to protect against these risks is greater than ever.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92423954
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Management Information System

Research projecton march 11th 2011 stackoverflow made a

Research Project On March 11th, 2011, StackOverflow made a significant change to their leaderboard. They now show users with top reputation gained in the past week, rather than all-time high reputation users. The rationa ...

1 discuss the difference between a business continuity plan

1. Discuss the difference between a Business Continuity Plan (BCP), and a Disaster Recovery Plan (DRP). 2. What would be your recommendation for training personnel on your BCP and DRP if your plan documents were adopted ...

Healthcare delivery systemsassignment health services

Healthcare Delivery Systems Assignment: Health Services Professionals Using the Word chart on page 2 of this assignment, describe the major types of health services professionals including key roles and training, practic ...

Question describe and discuss at least two backup

Question : Describe and discuss at least two backup strategies. Discuss the use of cloud backup strategies, as well? Please write minimum of 400 words with 0 % plagiarism and in APA format (Mandatory ).

Question you have been asked by management to secure the

Question : You have been asked by management to secure the laptop computer of an individual who was just dismissed from the company under unfavorable circumstances. Pretend that your own computer is the laptop that has b ...

Please create an introduction for my group project with 500

Please create an introduction for my group project with 500 + words or 1 complete page, List refs: Statement of Need The use of outdated technology will hinder a company's capabilities in all professional industries. Iss ...

Research histogram and its use then post a description of

Research Histogram, and its use, then post a description of Histogram, and describe it in detail-explaining its purpose and how it works. Give your opinion on when it would be appropriate to use this tool in an IT settin ...

In this assignment students will review the risk management

In this assignment, students will review the risk management framework (RMF). Provide an overview of the framework in a visual graphic format of the six steps in the process and provide a brief description of what happen ...

Crime prevention through environmental design cpted is

Crime Prevention Through Environmental Design (CPTED) is defined as a multi-disciplinary approach to deterring criminal behavior through environmental design. CPTED strategies rely upon the ability to influence offender ...

Assignment the need for wireless standards and

Assignment : The Need for Wireless Standards and Protocols The networking field, to include wireless networking, defines many standards to govern network and wireless network operations. It is important to become familia ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As