Sign In
Not register? Register Now!
Pages:
3 pages/β‰ˆ825 words
Sources:
6 Sources
Style:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 16.2
Topic:

Module 1 - SLP SOURCES OF SECURITY THREATS: HUMAN, NATURE, AND TECHNOLOGY FACTORS

Essay Instructions:

Module 1 - SLP SOURCES OF SECURITY THREATS: HUMAN, NATURE, AND TECHNOLOGY FACTORS This assignment requires you to write a 3- to 5-page paper (title page and references are not included) on the following topic: Using the categories of threats as well as the various attacks in reading materials, review newspapers for examples of each threat and attacks and discuss your findings.Module 1 Required Reading There are many sources of threats to information security: Human errors Cliff Edwards, Olga Kharif, and Michael Riley (2011). Human Errors Fuel Hacking as Test Shows Nothing Stops Idiocy Philip Sasser (2010). Human Error and Information Security Intellectual property Derek Slater (2012). Intellectual Property Protection: The Basics Pesante, L. (2008). Introduction to information security. Retrieved from https://www(dot)us-cert(dot)gov/sites/default/files/publications/infosecuritybasics.pdf Paul Rubens (2011). Stop Software Attacks From Destroying Your Servers Infosec Institute (Physical security: Managing the intruder) United States Government Accountability Office (2009). “Information Security: Cyber threats and vulnerabilities place federal systems at risk.” Information security attacks Brian Krebs (2011). Cyber Intrusion Blamed for Hardware Failure at Water Utility Perrow, Charles (2008). Software failure, security and Cyber attack. Natural and man-made disasters Iron Mountain. (2016). Protecting vital business from natural disasters. Retrieved from http://www(dot)ironmountain(dot)com/Knowledge-Center/Reference-Library/View-by-Document-Type/General-Articles/P/Protecting-Vital-Business-Data-from-Natural-Calam Please note: Write the report in your own words, and do not copy and paste from the sources. SLP Assignment Expectations Your paper should provide a summary of your findings from the assigned materials and any quality resource you can find. Cite all sources and provide a reference list at the end of your paper. The following items will be assessed in particular: Ability to consolidate ideas from reading materials. Demonstration of your understanding of information securities from different perspectives. When your paper is done, send it in.

Essay Sample Content Preview:

THREATS TO INFORMATION SECURITY
Name
Institution
Date
Introduction to information security
Internet connectivity has increased significantly in the recent years with an estimated 600 million computers connected to the internet as at present (Kharif, 2011). The internet consists of a worldwide network that is loosely connected that can be accessed with different individuals at various destinations through computer hosts. The different users can access the internet sources for information without limits to geographical boundaries. This convenience to information created by the use of internet services comes at a risk. Among the risks and threats include lose of information, or the information could be stolen, manipulated or misused. This mainly happens if the information systems are recorded electronically and made available to the different computer networks globally. This information is even safer when printed down into papers and stored in files in the organization or institution of question. There are three basic concepts of security of information that are to be considered, they include confidentiality of the information, integrity and the availability of the information when required (Kharif, 2011).
Threats to information security
The development of technological aspects has increased connections to the internet through different gadgets. This aspect has brought about creativity in the operations of important organizations. It has increased the cases of cybercriminals that are increasingly being a threat to information systems. One of the treats to information systems is the social media attacks on the information systems (Philip, 2010). With the increase in social media usage, the cybercriminals are using this as a channel to distribute water holing. This is a form of geographical; attacks on the information systems. In this threat, the cybercriminals identify a file or an information source that they believe majority of people will be using it regardless if it's an organizational or company website and infect it. This will thus destroy the information creating a threat.
The introduction of technological aspects with weak security to the field of information security has also posed a threat to the information security. New and advanced technology is being released globally on a daily basis. The new gadgets developed, for instance the smart phones developed in a form of internet connectivity with a not-so-well executed security strategy. Such a security breach creates a risk to the information security. It mainly affects electronic data (Philip, 2010). This is because any time there is a user accessing the internet service, there would be an unsecure connection and when the internet security system is exposed to unsecure co...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!