Sign In
Not register? Register Now!
Pages:
4 pages/β‰ˆ1100 words
Sources:
6 Sources
Style:
APA
Subject:
Technology
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 25.92
Topic:

ITM437 Information Security and Technology module 1 - Case SOURCES OF SECURITY THREATS: HUMAN, NATURE, AND TECHNOLOGY FACTORS

Coursework Instructions:

Module 1 - Case SOURCES OF SECURITY THREATS: HUMAN, NATURE, AND TECHNOLOGY FACTORS Case Assignment Based on the required reading materials and your own research, prepare a 4- to 7-page paper to discuss various threats to information security. You are to address the following questions in the paper:Module 1 Required Reading There are many sources of threats to information security: Human errors Cliff Edwards, Olga Kharif, and Michael Riley (2011). Human Errors Fuel Hacking as Test Shows Nothing Stops Idiocy Philip Sasser (2010). Human Error and Information Security Intellectual property Derek Slater (2012). Intellectual Property Protection: The Basics Pesante, L. (2008). Introduction to information security. Retrieved from https://www(dot)us-cert(dot)gov/sites/default/files/publications/infosecuritybasics.pdf Paul Rubens (2011). Stop Software Attacks From Destroying Your Servers Infosec Institute (Physical security: Managing the intruder) United States Government Accountability Office (2009). “Information Security: Cyber threats and vulnerabilities place federal systems at risk.” Information security attacks Brian Krebs (2011). Cyber Intrusion Blamed for Hardware Failure at Water Utility Perrow, Charles (2008). Software failure, security and Cyber attack. Natural and man-made disasters Iron Mountain. (2016). Protecting vital business from natural disasters. Retrieved from http://www(dot)ironmountain(dot)com/Knowledge-Center/Reference-Library/View-by-Document-Type/General-Articles/P/Protecting-Vital-Business-Data-from-Natural-Calamities.aspx Optional Reading Infosecurity. (April, 9). US Airforce designates six cyber tools as weapons. Retrieved from http://www(dot)infosecurity-magazine(dot)com/news/us-air-force-designates-six-cyber-tools-as-weapons/ Security strategies, retrieved from http://technet(dot)microsoft(dot)com/en-us/library/cc723506.aspx Brewster, T. (October 2010). Five security disasters to shake the world, retrieved from http://www(dot)itpro(dot)co(dot)uk/628090/five-security-disasters-to-shake-the-world Why is information security an important issue? What are the sources of information threats (human, nature, and technology factors, etc.)? Assignment Expectations Your paper should provide a summary of your findings from the assigned materials and any quality resources you can find. Cite all sources and provide a reference list at the end of your paper. The following items will be assessed in particular: Ability to consolidate ideas from reading materials. Demonstration of your understanding of information securities from different perspectives. Application of your understanding of information security in a business or organizational environment.

Coursework Sample Content Preview:

INFORMATION SECURITY
Name:
Instructor:
Institution:
Date:
Introduction
Information security is the collection or assembly of all the necessary techniques that can be used to safeguard data and information of an individual or entity. The current information age has brought with it increased challenges to information security. More and more organizations and even governments are beginning to understand the high stakes involved in safeguarding their data. There are various sources of threats to information, such as human errors, natural and manmade disasters, as well as cyber attacks. Having a deeper knowledge of each will be helpful in understanding the kind of challenges being faced, and the subsequent strategies to keep safe.
Why is information security an important issue?
Globalization has ushered in an age where information is virtually the heartbeat of everything. The access to reliable, accurate and vital information can be the difference between success and failure, life and death. Businesses rely on such information to ensure that they remain afloat and competitive in this dynamic environment that has cutthroat competition. Individuals too need information to make informed decisions on various issues (Dell, 2014).The same applies to governments, which use information to plan for the present and the future of their citizens.
With this, however, comes the reality of information leakage. Vital or highly sensitive information might fall into the wrong hands, such as terrorists or criminals, people with ulterior motives. When such a breach happens, a lot of things are at stake. The security of a country, the business of an organization or even the wellbeing of an individual is all at the mercies of these negative agents. A hacker might use the stolen information to steal money from banks or personal bank accounts. For some, they sell the information to business competitors, who might need it to gain a competitive edge over the other, or even to sabotage the operations of the competitors (Dell, 2014).There are also those traitors, whose job is to spy and steal information, especially about the military, and convey it to another country. All these confirm how high the stakes are when it comes to data security.
It is also important to note that information security is not just about protecting it from external access. It is not just about protecting it from leakage. Sometimes, it is about protecting it from loss or lack of access. For example, a wrong move by the employees of an organization might result in the destruction of an individual source of data. Information security, therefore, is the single most important issue for any entity, besides management.
Sources of threats to information security
* Human errors.
Information is at risk from the same entities mandated to safeguard it. In an organizational setup, employees are usually easy targets for hackers, who simply do phishing. In phishing, an email or link is sent to one's computer requiring a particular condition to be done after opening it. Once these links are clicked on, a bug is released into the computer system, which steals vital information such as personal details and passwords. Employees often fall prey to this, since some of them a...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Coursework Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!