Premium Essay

Challenges and Security Issues

In:

Submitted By castlewell
Words 1227
Pages 5
Unit 5 IP – Challenges and Security Issues
American InterContinental University

Abstract
In this assignment, review of three different case studies will be discussed. Topics will include when an antivirus software cripples your computer, determining how secure cloud computing is, and electronic medical records systems. After the review of each case study, a set of questions will be answered to provide details on each study as to what was reviewed.

Challenges and Security Issues (Case Studies)
Introduction
In this assignment, review of three different case studies will be discussed. Topics will include when an antivirus software cripples your computer, determining how secure cloud computing is, and electronic medical records systems.
Case Study #1 When Antivirus Software Cripples Your Computers
On April 21, 2010, McAfee crippled hundreds of thousands of McAfee equipped machines, by mistakenly sending an update to its users reclassifying svchost.exe as being a malicious file which was known as W32/wecorl.a virus (Humphries, 2010, para 1-2).
The factors that were responsible for this software problem was that McAfee failed to send users a warning notifying them that svchost.exe was going to be either deleted or quarantined; instead they deleted the file completely. On the other hand, failure to detect this error was at the fault of McAfee’s automated quality assurance. Another reason this spread so quickly is because of the high demand for faster antivirus updates. As soon as their customers receive an update, they are quick to download it to ensure the safety of their machines.
The business impact that this issue had on the business and its customers was very bad. McAfee could have potentially ruined the company brand by not reacting to the situation fast enough. Also, customers and businesses were without their computers in which it took time to

Similar Documents

Premium Essay

It Security Policy Framework

... When implementing a security policy many elements should be considered. For example, the size of the organization, the industry, classification of the data processed, and even the organization’s work load must be taken into account. As with any industry, selecting the proper security framework for an insurance organization should be done cautiously. This is because having too strict of a policy may inconvenience the employees or even their customers. Because of this, consultants must bear in mind that the information handled by insurance organizations is not as sensitive as a healthcare organization, for example. Nonetheless, establishing compliance is important to protect customer information and abide by U.S laws and regulations. Organizations must also identify and address some of the framework implementation challenges that may arise. These challenges are not exclusive to one organization, but all who develop a security policy framework. It is up to the organization to be able to overcome these issues with the proper strategies. IT Security Framework for the Insurance Company An ideal security framework the insurance company should abide by is the International Organization for Standardization (ISO) 27001. This standard explains the requirements for companies to meet their Information Security Management System (ISMS) needs. It provides companies with guidance to establish, implement, maintain, and improve their information security (“An introduction to ISO...

Words: 1329 - Pages: 6

Premium Essay

Cloud Security Issues

...See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/259072387 Cloud Computing Security Issues and Challenges ARTICLE · JANUARY 2011 CITATIONS READS 13 20,419 1 AUTHOR: Ibikunle Ayoleke Botswana International University of Science… 29 PUBLICATIONS 30 CITATIONS SEE PROFILE All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. Available from: Ibikunle Ayoleke Retrieved on: 13 February 2016 Kuyoro S. O., Ibikunle F. & Awodele O. Cloud Computing Security Issues and Challenges Kuyoro S. O. afolashadeng@gmail.com Department of Computer Science Babcock University Ilishan-Remo, 240001, Nigeria Ibikunle F. faibikunle2@yahoo.co.uk Department of Computer Science Covenant University Otta, 240001, Nigeria Awodele O. delealways@yahoo.com Department of Computer Science Babcock University Ilishan-Remo, 240001, Nigeria Abstract Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for ...

Words: 4240 - Pages: 17

Premium Essay

Human Security

...on how to approach the concept of human security as a topic for such a report. Human Security A Thematic Guidance Note for Regional and National Human Development Report Teams BY OSCAR A. GÓMEZ AND DES GASPER Contents What is Human Security?............ 2 Getting Started...................................... 4 Selecting objectives and themes...... 4 The process.................................................... 6 Many important aspects of human development relate also to people’s security: loosely defined as people’s freedom from fear and freedom from want in a broad sense. Applying a human security approach offers an opportunity to analyse many issues in an informative way. This note explains how one might go about doing that. Human security relates to much more than security from violence and crime. A report team wanting to look at the security of people’s livelihoods (economic, food, environment or health security) might apply a human security approach. Human security can also be used to look into personal, community and political security. Indeed, human development reports from around the world have applied the approach in other innovative ways. But on each occasion, these reports have analysed a threat, or groups of threats, and how they affect particular groups of people. And so if one is interested in preparing a human development report that is focused on one or more of the threats people face, then a human security approach is worth considering. This note...

Words: 7478 - Pages: 30

Premium Essay

Cloud Computing Challenges

...Cloud Computing – the Challenges!! ABSTRACT The word ‘cloud’ has become the hottest buzzword these days. Everything has started moving towards cloud and we could feel that ‘Cloud Computing’ as a revolutionary concept that is going to bring us to Internet ubiquity. At the same time there are also barriers to it. This paper discusses about various cloud-computing challenges, security challenges for cloud & security benefits of cloud. Table of Contents Introduction 4 Cloud Computing Challenges 4 Security Challenges 4 Data Security 5 Cloud Computing Security Issues 5 Security Benefits 6 Conclusion 7 Introduction Cloud Computing delivers information or services to customers who pay for what they use. The customer can be an external person or company who is paying for a service or information or an internal customer, such as the application proprietor who is using services that another division within the same company is offering, and who is being charged for consumption. There are two different types of clouds – Public cloud and Private cloud. In public cloud the information and services provided to the customer are from external sources and in private cloud customer gets the information from internal sources. With the public cloud, the customer does not own any storage or server and also no capital expenditure; the customers merely pay money for what they need on demand. With the private cloud, the customer is an internal customer so the company...

Words: 1970 - Pages: 8

Premium Essay

The Challenges in Implementing Iso 27001

...talk about security standards. On this term paper we are going to first identify what is IOS 27001 from different point of view, second we will explain the challenges in implementing ISO 27001 by evaluating the framework of ISO, discussing the benefit and advantages of ISO 27001 and why it's used in UAE. After that we will clarify the challenges of ISO 27001 after interviewing two companies and get rich information from their experience in this filed then compare the challenges in and out UAE based on (3-4) articles. What is ISO/IEC 27001 1- ISO/IEC 27001 is a Controls-based policy o A comprehensive set of controls comprising best practices in information security and It's an Information standard that encompasses all types of information. o “Whatever form the information may take, or means by which it is shared or stored, it should always be appropriately protected” (ISO17799:2000) (FIRSTSOURCE,Undated) 2- ISO/IEC 27001:2005 : o Provides strategic and tactical direction o Recognizes that Information Security is a Management issue o Non-technical (BUREAU VERITAS) 3- ISO 27001(earlier BS 7799) is an International standard which provides a model (PDCA Model) for setting up and managing an effective ISMS. o ISMS is that part of the overall management system, based on a business risk approach, to establish, implement, operate, monitor, review, maintain and improve information security. o It provides 11 Security Control Clauses under 39 Key Security Categories...

Words: 2150 - Pages: 9

Premium Essay

Cloud Computing

...Dublin Institute of Technology ARROW@DIT Dissertations School of Computing 2010-09-01 Cloud Computing:Strategies for Cloud Computing Adoption Faith Shimba Dublin Institute of Technology, faith.shimba@gmail.com Recommended Citation Shimba, F.:Cloud Computing:Strategies for Cloud Computing Adoption. Masters Dissertation. Dublin, Dublin Institute of Technology, 2010. This Dissertation is brought to you for free and open access by the School of Computing at ARROW@DIT. It has been accepted for inclusion in Dissertations by an authorized administrator of ARROW@DIT. For more information, please contact yvonne.desmond@dit.ie, arrow.admin@dit.ie. This work is licensed under a Creative Commons AttributionNoncommercial-Share Alike 3.0 License School of Computing Dissertations Dublin Institute of Technology Year  Cloud Computing:Strategies for Cloud Computing Adoption Faith Shimba Mr. Dublin Institute of Technology, faith.shimba@student.dit.ie This paper is posted at ARROW@DIT. http://arrow.dit.ie/scschcomdis/1 — Use Licence — Attribution-NonCommercial-ShareAlike 1.0 You are free: • to copy, distribute, display, and perform the work • to make derivative works Under the following conditions: • Attribution. You must give the original author credit. • Non-Commercial. You may not use this work for commercial purposes. • Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under a license identical...

Words: 35464 - Pages: 142

Premium Essay

Critical Report

...Asia Internal Political Challenges, Inter-State Conflicts and Regional Security Southeast Asia has been one of the most vibrant regions in recent years. This resilient and dynamic region is one of the major hubs at the heart of Asia and is likely to play a significant role in the rising Asia. It can help shape and evolve the larger regional architecture in the Asia-Pacific region. Inside Southeast Asia, the internal political and social systems and the interaction between the two have created an interesting mix of hope, challenges and threats at the national, bilateral and regional levels. Besides, with the ongoing economic integration and political and security cooperation with regional powers, the regional organization-ASEAN seeks to balance these relations with the proliferation of new powers. The Institute of Peace & Conflict Studies (IPCS), as an independent research institute and a leading think-tank, explores what is happening in Southeast Asia today. The Southeast Asia Research Programme (SEARP) at the Institute monitors these internal issues in the region on a regular basis and further intends to convert the process into a annual meet to understand the dynamics of the current issues, challenges and problems in Southeast Asia. Three themes have been identified in the region which need immediate attention– Internal political challenges, inter-state conflicts and ASEAN and regional security. Theme-I Internal Political Challenges The primary security concerns confronting...

Words: 1788 - Pages: 8

Free Essay

Balance in the Administration of Justice and Security

...Balance in the Administration of Justice and Security Integrative Paper University of Phoenix Balance in the Administration of Justice and Security Integrative Paper Justice and security are faced with concerns that affect in the daily processes. The concerns have to balance to guarantee no rights are violated. This paper will analyze the concerns regarding the legal environment in which the justice and security administrations function, the transformation in technology and mass communication and the influence on justice and security areas, the problems involving an individual’s rights as opposed to the needs of the justice system and security upholding order and public safety, how the growth of justice and security over the 21st Century best balances rights and freedoms with vigilance, and appropriate authority to safeguard the public in a free society with respect to constitutional assurances regarding individual rights. Issues Regarding Legal Environment Issues regarding the legal environment are abundant, especially when discovering how justice and security administrations function. To begin with, it is important to know who a security or legal administrator is. A security or legal administrator is an individual who fulfills an office management position or a non-attorney position and is liable for total routine operations. He or she is liable for safeguarding the distribution of services by overseeing his or her employees and recognizing and creating business prospects...

Words: 2197 - Pages: 9

Premium Essay

Blah Blah Blah

...ASEAN and Regional Security in East Asia Introduction  Established in August 1967  ASEAN has placed a central role in ensuring peace among its members. • South Asia has enjoyed a relative period of stability and period. (e.g. Laos & Vietnam and Cambodia & Myanmar) • Regional cooperation  Interstate Relations  Regional Economics Cooperation and trust  Strategies and principles employed by ASEAN in regional security.  Challenges that Challenges that might shake ASEAN’s role as a regional manager.  Practical measures that ASEAN needs to take note of.  2 Pillars of Regional Security 1. Multi-lateral institutions (since 1993) • ASEAN Regional Forum (ARF) in 1993 • ASEAN plus three (APT) in 1997 • East Asian Summit (EAS) in 2005 2. Bilateral Alliance System  Economics Policy  The Challenges 1. Development in major geostrategic shift. 2. Development complicates the security challenges in the region ASEAN AS A MANAGER OF REGIONAL ORDER: STRATEGIES AND PRINCIPLES  With its achievements in domestic economic development, ASEAN’s confidence grew and began to extend its security role beyond SEA (e.g. ARF, ART, and EAS) • Positioned itself a s a regional order  ASEAN • From a modest sub- regional association to an organization. • Since 1967, it approached security matters in comprehensive manner. For SEA countries: 1. Security has always encompassed wide arrays of issues in social, cultural, economic, political, and military fronts...

Words: 634 - Pages: 3

Premium Essay

Changes in Corporate Security

...The Changing Faces of Corporate Security Not too long ago, when one talks about corporate security it simply means protecting the office, building or infrastructure the company is located. Corporate or industrial security would have also involved conducting background investigation on future and current employees as well as embarking of investigations from minor office policy violations to major legal infractions that would warrant the involvement of law enforcement agencies. Of course in those days, the concern mostly would be access control – who or which goes in or out, badging or identification of personnel and visitors, and checking of goods, supplies and inventories going in and out of the company premises. For sure, the older corporate security officers or security directors would missed “then good old days” when things where simpler in the realm of corporate or industrial security. The last couple of decades saw not just a paradigm shift in corporate security but a total organizational, cultural, procedural, competency and scope change. This is just a short list of the changes or the evolution corporate security or the industrial security officer has been and will be going through. The threats, risks and vulnerabilities then were clear cut and in “black and white.” Today, we have what are called blended threats that encompass a wider spectrum in corporate security. Aside from this, information technology is playing a big role. “Emerging technology is rocking...

Words: 1625 - Pages: 7

Free Essay

Ebola Virus

...EBOLA VIRUS DISEASE AND NATIONAL SECURITY IN NIGERIA: AN APPRAISAL INTRODUCTION 1. Governments worldwide desire an epidemic free and healthy nation. The outbreak of the highly contagious Ebola Virus Disease (EVD) with fatality rate of up to 90 per cent could become an epidemic if not contained. It is a serious concern to governments since it threatens the health and Well-being of the Citizens (WC) and invariably the National Security (NS) of countries. 2. In the United States of America (USA), the infection of 2 missionaries with EVD while working in Liberia, prompted President Obama to stress that EVD is a threat to the NS of USA. The current EVD outbreak in West Africa has reached an epidemic level and has spread across Liberia, Sierra Leone and Guinea. By 25 Oct 14, World Health Organization (WHO) reported 10,141 cases. The fatalities have negative effect on human resource and businesses, restrict movement and cause general panic thereby affecting the NS of these countries. 3. In Nigeria, there were confirmed cases of EVD in Lagos and Rivers States. The Federal Government of Nigeria’s (FGN) efforts at isolating, treating and monitoring EVD cases led to its containment and thereby made WHO to declare Nigeria EVD free on 20 Oct 14. Despite these efforts, EVD could re-occur as seen in other countries and could threaten NS of Nigeria. The purpose of this paper therefore is to discuss EVD as it affects NS in Nigeria. The paper will cover conceptual...

Words: 1929 - Pages: 8

Premium Essay

Nt1310 Unit 3 Assignment 1

...Randall Lilley CIS611 – T302 Cloud Computing Dr. Charlie Collins 15 May 2016 NIST The National Institute of Standards and Technology (NITS) set guidelines for managing security and privacy issues in cloud computing. It came up with privacy and security challenges which may face the whole system, and came up with recommendations which the organizations should take before they embark on cloud computing. The guidelines include technology risks, threats and measures to take in relation to cloud environment. Additionally, they give the organization an opportunity to make important decision as it relates to the use of applications within the cloud computing environment, as well as the general process of outsourcing. Data storage and the whole cloud computing system is a workable system for...

Words: 1367 - Pages: 6

Premium Essay

Sdasd

...Technovation 34 (2014) 339–341 Contents lists available at ScienceDirect Technovation journal homepage: www.elsevier.com/locate/technovation Editorial The challenge of cyber supply chain security to research and practice – An introduction a b s t r a c t The tremendous potential to assist or degrade economic and national security performance make security in the cyber supply chain a topic of critical importance. This is reflected by the tremendous activity in the public and private sector to better understand the myriad of cyber challenges, identifying existing gaps and needs and closing these gaps as quickly and firmly as possible through government policy initiatives, public/private partnerships, and legal/insurance penalty and incentive regimes. However when we examine the academic literature, the research and publications in this area are rather sparse. Consequently, this special issue on Security in the Cyber Supply Chain is intended to act as a resource to practitioners and as a call to research. & 2014 Published by Elsevier Ltd. Introduction In general, the cyber supply chain provides tremendous advances in efficiency and effectiveness. The economy gains through transactions being more efficient through the low cost rapid transmission of information related to supply chain management. Not only does this rapid transmission reduce cost, but it also provides value through increased effectiveness allowing for services and decisions that were not possible...

Words: 2975 - Pages: 12

Premium Essay

The Internet

...Managing Information Technology Security isn’t simply a technology issue, it’s a business issue. Discuss In any given organization information technology generally refers to laptop and desktop computers, servers, routers, and switches that form a computer network, although information technology also includes fax machines, phone and voice mail systems, cellular phones, and other electronic systems. A growing reliance on computers to work and communicate have made the control of computer networks an important part of information security. Security days as just a technical or technology issue are done. It is becoming a central concern for leaders at the highest level of many organizations and governments, transcending national borders. Customers are demanding the highest security, as worries about privacy, the protection of personally identifiable information, and identity theft grow. Business partners, suppliers, and vendors are requiring it from one another, particularly when providing mutual network and information access. Networked efforts to steal competitive intelligence and engage in extortion are becoming more prevalent and widespread. Security breaches and data disclosure increasingly arise from criminal behavior motivated by financial gain. As additional evidence of this growing trend is sort, the Deloitte 2007 Global Security Survey of top global financial services institutions states the following and I quote “Information security is no longer a technology-focused...

Words: 989 - Pages: 4

Premium Essay

Staddium Management System Project

... …………………………………………….Supervisor ConfirmationName: Mr. Gabriel Kamau Date: Signature………………………………….. ……………….……………………………. | Abstract Although many stadium management systems have been developed today, major issues which could make these stadium management systems interactive towards the public/stadium users and be able to play a leading role in ensuring that a well secure stadium is realized have not been implemented. Ensuring that there is a better and efficient means by which the stadium can be able to communicate to its users today informing them of the activities which do take place in the stadium such as the day of football matches has been a pretty challenge to most stadium managers. Yet communication among relevant parties is recognized as the only means by which absolute trust and effective service delivery can be achieved. Ways of handling insecurity in the stadiums appears also to be a major challenge globally especially when we consider the issue of global terrorism which appears to be on the rise. Handling emergency situations when there is an insecurity incident in the stadium also is an issue which also has become a nightmare to many stadium managers because of the lack of proper emergency response coordination. Stadium management...

Words: 7302 - Pages: 30