Premium Essay

Cyber Security in Business

In:

Submitted By rpmunlmtd
Words 1513
Pages 7
Cyber Security in Business Organizations
Robin P. McCollin
CIS 500 Information Systems – Decision Making
Constance Blanson
Fall 2014

The terms information security, computer security, and cyber security are all terms that are sometimes used interchangeably. To better understand the similarities and differences between the terms, one must first understand what exactly is being secured. For example, Information security is generally regarded as the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability. Computer security consists of measures and controls that ensure confidentiality, integrity, and availability of information system assets including hardware, software, firmware, and information being processed, stored, and communicated. Cyber security focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction. Although each of the terms above are very specific in their security objectives, all three have a central theme, the protection of valuable information; data. Regardless of how the data is stored, why it is stored, where it is stored, or for how long it is stored, the protection of data is paramount and a major concern for governments, military, corporations, and financial institutions. As such, executives and industry professionals are consistently faced with what Jesper M. Johansson calls the “Defender’s Dilemma.” As defenders, the goal is to protect all your data, including where it is exposed in all interactions between your components. The defender, therefore, must protect all possible points. Adequate protection must be provided for data at rest and in flight, on all devices, no matter who owns the devices. The more places information

Similar Documents

Premium Essay

Cyber Security in Business

...Case Study 1: Cyber Security in Business Organizations Abstract This paper examines the importance of cyber security in business organizations and discovering better methods to combat cyber terrorism in the future. Data breaches in the work place have become an increased threat to personal privacy as well as to the economic livelihood of many organizations. In this paper we will further examine how a simple data breach almost brought the retail giant Target to the brink of destruction and provide detailed accounts of other recent data security breaches that have effected other business organizations and discuss what could be done to prevent them. Cyber Security in Business Organizations Modern global industries rely heavily on the data that they acquire to stay relevant in order to compete in a constantly moving world of technology. Protecting present and future data from potential cyber theft has become a vital need to the economic livelihood of today’s organizations. In today’s business world, organizations must prepare themselves for not only increased vulnerability attacks from exterior threats of cyber terrorist seeking to gain access to a company’s private data and resources but also have to take in account and be mindful of the interior threat of disgruntled employees whose mission is to expose or sale company sensitive or secret data for their own profitable gain. In today’s era of computing, cyber security can be described and defined in several ways...

Words: 1143 - Pages: 5

Premium Essay

Cyber Security in Business Organizations

...Cyber Security in Business Organizations 1 Cyber Security in Business Organizations David Hodges Strayer University Dr. Richard Brown May 14, 2015 Cyber Security in Business Organizations 2 Abstract This paper will assess the importance of information management in the insurance industry. How information management has help overall change the marketplace. The essential role of enterprise architecture in the industry will also be discussed and how it contributes to management decision making. Different data storage options for the industry will be discussed alone with the functions and which provides the best possible support for the industry overall. Cyber Security in Business Organizations 3 Due to the increased use of information and communication technologies in business organizations to today, the incidents of computer abuse has increase exponential. It has become increasingly difficult to protect customer information and company asset. Some of the challenges in security business organization have when it comes to breach includes the following: unauthorized users get access to computer systems and disclose confidential information, unauthorized users change the information...

Words: 1200 - Pages: 5

Premium Essay

Cis 500 - Cyber Security in Business Organizations

...Case Study #1 Cyber Security in Business Organizations CIS 500: Information Systems for Decision-Making Cyber Security in Business Organizations On December 19, 2013, the Target Corporation in Minneapolis, MN, put out a press release on their website confirming there had been a security breach allowing unauthorized database access to their Point of Sale (POS) systems, between November 27 and December 15, 2013. Target reported approximately 40 million credit/debit card accounts could have been affected. In the release, Gregg Steinhafel, chairperson, president and chief executive officer, stated the following, “Target’s first priority is preserving the trust of our guests and we have moved swiftly to address this issue, so guests can shop with confidence. We regret any inconvenience this may cause. “We take this matter very seriously and are working with law enforcement to bring those responsible to justice.” (Target Press Release, 12/19/2013). Retailers are prime targets for hackers. Why? Simply stated, Risk versus Benefit. Retail stores compile a vast amount of financial data and banking information for millions of people across the country. It could be considered a new version of bank robbery. Rather than dealing with all the planning, resources needed and danger involved with robbing one actual bank, not to mention having to split the money with cohorts, hackers can skip the bank altogether. Obtaining consumers’ banking information provides all the benefits...

Words: 2080 - Pages: 9

Premium Essay

Cybersecurity

...EXECUTIVE SUMMARY This paper details the importance of cyber security in the face of evolving cyber threats and the ever-increasing attacks on government and businesses alike. We live in a globally connected world and globally distributed cyber threats. Not restricted by geographical boundaries these threats target all technologies, service providers, and consumers. The threats are at an all-time high, in terms of sophistication and volume, and continue to trend upwards. WHAT IS CYBERSECURITY? Twenty years ago businesses did not think twice about cyber security. In a world of mainframes and dumb terminals with no connectivity to anything outside, viruses, malware, and hacking was unheard of, however, with the introduction of the Internet things have now changed. The term cyber security is getting more and more mixed usage lately, so much so that it is almost as ambiguous as the term "cloud". Cyber security, referred to as information technology security, is the focus on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction. Cyber security also encompasses ten different security domains. The following domains provide a foundation for security practices and principles: • Access Control - to maintain information confidentiality, integrity, and availability, it is important to control access to information. Access controls prevent unauthorized users from retrieving, using, or altering information. They are...

Words: 1611 - Pages: 7

Free Essay

The Uk Cyber Security Strategy - Written Ministerial Statement

...for the Cabinet Office and Paymaster General: The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World ______________________________________________________________________ Francis Maude I have today published the new Cyber Security Strategy for the United Kingdom. I have placed a copy in the Library. The growth of the internet has transformed our everyday lives. But with greater openness, interconnection and dependency comes greater vulnerability. The threat to our national security from cyber attacks is real and growing. Organised criminals, terrorists, hostile states, and ‘hacktivists’ are all seeking to exploit cyber space to their own ends. This Government has moved swiftly to tackle the growing danger posed by cyber attacks. Our National Security Strategy published last year classed cyber security as one of our top priorities alongside international terrorism, international military crises and natural disasters. To support the implementation of our objectives we have committed new funding of £650m over four years for a transformative National Cyber Security Programme (NCSP) to strengthen the UK’s cyber capabilities. The new Cyber Security Strategy we have published today sets out how the UK will tackle cyber threats to promote economic growth and to protect our nation’s security and our way of life. One of our key aims is to make the UK one of the most secure places in the world to do business. Currently, around 6 per cent of the UK’s GDP is enabled...

Words: 930 - Pages: 4

Premium Essay

Cyber Forensics

...Applications (IJNCAA) 2(1): 127-137 The Society of Digital Information and Wireless Communications, 2012 (ISSN: 2220-9085) Cyber Forensics: Computer Security and Incident Response Virginiah Sekgwathe1, Mohammad Talib2 1 Directorate on Corruption and Economic Crime, Gaborone, BOTSWANA veesek@gmail.com 2 Department of Computer Science, University of Botswana, BOTSWANA talib@mopipi.ub.bw ABSTRACT The intensification of Information and Communications Technology usage in all facets of life exceedingly amplify the incidents of information security policy breaches, cyber crimes, fraud, commercial crimes, cyber laundering etc, hence require a well developed approach to tackle these incidents in order to realize legally defensible digital evidence. Since electronic evidence is fragile and can easily be modified, finding this data, collecting, preserving, and presenting it properly in a court of law is the real challenge. There is a need for use of semantic analysis to discover underlying security policy requirements and internal power structures and institutionalization of anti cyber attack, antimoney-laundering and regulatory schemes. The first responders to cyber security incidents often than always are an organization ICT personnel who are technically sound though may be deficient in investigative skill. The scientific standards of cyber forensics dictates the procedure as it promotes objectivity, a precise and well documented analysis, particularly...

Words: 5129 - Pages: 21

Premium Essay

Cyber Crime

........................................................................................ 2 3.1. Cyber Crime ................................................................................................................................. 2 3.2. Cyber security ............................................................................................................................... 3 4. Key Findings / Discussion of your research topic ............................................................................ 3 4.1. The major risks of cyber security ................................................................................................. 3 4.1.1. To consumers ........................................................................................................................ 3 4.1.2. To businesses........................................................................................................................ 4 4.1.3. IT organisations ..................................................................................................................... 4 4.1.4. Telecommunication companies ............................................................................................. 5 4.1.5. Government ........................................................................................................................... 5 4.2. The origin of cyber security .................................................................................................

Words: 3380 - Pages: 14

Free Essay

Cyber Ethics

...Cyber Ethics CSEC 620 As one of the most uncertain and muddled aspects of any organization or company, Cyber Ethics are undoubtedly one of the most important in today’s technological age. Every organization or company operates with a Code of Conduct for its employees. This Code of Conduct outlines the “dos and don’ts” for an organization in hopes for “ethical” and “moral” operation of business. A typical code of conduct will outline an Acceptable Use policy, Internet Use policy, Security policy, and acceptable conduct policy for its employees that is supposed to be required reading. Like with any law, in cyber security there are always law-breakers waiting for the chance to exploit a weak firewall, a patch in the system, or a careless employee who leaves login information open for the wrong eyes to see. For this reason government and private sector alike must constantly update security measures and do thorough investigations of employees upon hiring. The internet is so large and open that it is a serious security threat for individual corporations and especially government agencies. The US government defends against countless internet attacks every day and because of the vast connections between private companies and government it is both the responsibility of private and public sector to insure everyone’s safety. Developing a widespread Code of Ethics in regards to Cyber Security is an increasingly difficult task. New advances in technology make it difficult to...

Words: 2222 - Pages: 9

Premium Essay

2012 Us Cost of Cyber Crime Study Final6

...2012 Cost of Cyber Crime Study: United States Sponsored by HP Enterprise Security Independently conducted by Ponemon Institute LLC Publication Date: October 2012 Ponemon Institute© Research Report 2012 Cost of Cyber Crime Study: United States Benchmark Study of U.S. Companies Ponemon Institute October 2012 Part 1. Executive Summary We are pleased to present the 2012 Cost of Cyber Crime Study: United States, which is the third annual study of US companies. Sponsored by HP Enterprise Security, this year’s study is based on a representative sample of 56 organizations in various industry sectors. While our research focused on organizations located in the United States, many are multinational corporations. For the first time, Ponemon Institute conducted cyber crime cost studies for companies in the United Kingdom, Germany, Australia and Japan. The findings from this research are presented in separate reports. Cyber attacks generally refer to criminal activity conducted via the Internet. These attacks can include stealing an organization’s intellectual property, confiscating online bank accounts, creating and distributing viruses on other computers, posting confidential business information on the Internet and disrupting a country’s critical national infrastructure. Consistent with the previous two studies, the loss or misuse of information is the most significant consequence of a cyber attack. Based on these findings, organizations need to be more vigilant...

Words: 9057 - Pages: 37

Premium Essay

Supervisor

...Cyber Security Student: Maurice Jones Class ISSC461: IT Security: Countermeasures Instructor: Professor Christopher Weppler Date: 2 August 2013 Introduction “In a future conflict, an adversary unable to match our military supremacy on the battlefield might seek to exploit our computer vulnerabilities here at home (President Barack Obama, 2012).” Technology has changed the total lifestyle of people around the world. Here in the United Stated, society’s daily lives revolve around social interaction, economic stability, job security and information dominance. Information Dominance is “the degree of information superiority that allows the possessor to use information systems and capabilities to achieve an operational advantage in a conflict or to control the situation in operations other than war while denying those capabilities to the adversary (US Cyber Command, 2012).” Corporations as well as many of the world’s governments have risen and fallen due to their degree of Information Dominance and Information Security. Cyber-attacks have increased exponentially within the last 10 years. Battlefield lines that were once drawn in the sand no longer exist. Cyber-attacks can occur from any location in the world and at any time. A Cyber-terrorist has the ability to use current communication infrastructure to launch an attack that could cripple a nation. In 2012, Defense Secretary, Leon Panetta spoke at the Business Executives for National Security (BENS) summit....

Words: 3217 - Pages: 13

Premium Essay

Boss

...Moss Bus. 101 1/2/13 Cyber Security Cyber security is defined as actions taken to safeguard information technology or computer systems against unapproved access or attack. Cyber security has become really important for businesses and modern society today. We are living in a world where information technology and other types of communication systems have a great impact on us because they infiltrate every aspect of our lives. This builds a protection of our intangible assets and actions within cyberspace which are of great importance, whether for sustaining a prosperous business, individual life and society. We are becoming more and more dependent upon information technology and the dangers we face are organized and growing. There are numerous threats that involve the cyber world. Among these are the hackers infiltrating into people’s systems and damaging files, viruses that are eliminating the system, individuals using others devices to harm others, someone pocketing your valuable credit card information to make their own purchase. Attacks from hackers and terrorist have prompted the focus on cyber security. Whenever we mention cyber security, we are focused on the prevention, revealing and reaction to attacks and threats having to do with information in your computers. As mentioned by Prof. Moss, IT security threats are more and more focused on the robbery of valuable data. Frequently, there are malicious codes or malware that pass through our security systems when we access...

Words: 1036 - Pages: 5

Premium Essay

Cyber Market

...Cyber Security Market is evolving and at a rapid pace daily. The report proposes information on key market drivers, restraints, challenges, and opportunities. Major playing fields of cyber security markets are aerospace, defense, intelligence, government, public utilities, healthcare, telecom, IT, manufacturing, retail and others to say a few. Although cyber security is a familiar internet frenzy, it also has security segments of cyber security, such as network security, endpoint security, application security, content security, wireless security, and cloud security. Which in reality is used and accessed daily. Education, training and consulting segments are sub segments under service segment. With Business models and the way business being executed is changing to a user friendly environment of BYOD (Bring Your Own Device) model this all poses threat to cyber security. Anti –virus, Anti- malware are expected to acquire the highest market share due to this. Next Generation Firewall (NGFW) an advanced version of the firewall that filters network and internet based traffic helps to detect application specific attacks is also another major solution. File layer attacks are the key emerging trends responsible for increasing these cases. Cyber security has some challenges, keep in mind that with any growth this is expected. With the stroke of a key, click of a mouse, combined with rapid Internet use cyber security growth will be amongst the masses. Every major government agency...

Words: 293 - Pages: 2

Premium Essay

Information Security Policy in Malaysia.

...Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms. Governments, military, financial institutions, hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research, and financial status. Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers. Should confidential information about a businesses customers or finances or new product line fall into the hands of a competitor, such a breach of security could lead to lost business, law suits or even bankruptcy of the business. Protecting confidential information is a business requirement, and in many cases also an ethical and legal requirement. For the individual, information security has a significant...

Words: 6195 - Pages: 25

Premium Essay

The Pros And Cons Of Cyber Security

...How does a company stop hackers before they manage to infiltrate their corporation? The answer is quite simple: cyber security. Cyber security can be a costly investment, yet it could potentially save a company from an embarrassing data breach. Cyber security is a very real issue in the world today, and most companies have a lot of room for improvement. Cyber security is quickly becoming a very large concern in today's world. There are more cyber security threats than there used to be (Millier). Hackers easy access to various hacks that can be used to take down a company and get sensitive data. Cyber-crime has taken on a larger scale with big groups of people targeting large businesses (Millier). Since larger companies are being targeted,...

Words: 1785 - Pages: 8

Premium Essay

Cyber Security Act

...Lodhi Road New Delhi – 110003 Discussion draft on National Cyber Security Policy “For secure computing environment and adequate trust & confidence in electronic transactions ” Your comments/feedback on this document are most welcome. Please send your valuable comments/feedback by 15 May 2011 to Dr Gulshan Rai, Director General, CERT-In, at the at the above address or on email id ‘grai@mit.gov.in’ Discussion draft Department Of Information Technology National Cyber Security Policy “For secure computing environment and adequate trust & confidence in electronic transactions ” Contents 1.0 Security of Cyber Space – Strategic perspective 1.1 IT as an engine for economic growth and prosperity 1.2 Security of cyber space - Need for action 1.3 Target audience 1.4 Securing cyber space – Key policy considerations 2.0 Cyber space – Nature of threat 2.1 Threat landscape 2.2 International cooperation 2.3 Securing cyber space – Scope of action 2.3.1 Cyber security and cyber defense 2.3.2 Cyber intelligence and cyber defense 2.4 Priorities for action 2.5 Partnership and collaborative efforts 3.0 Enabling processes 3.1 Security threat and vulnerability management 3.2 Security threat early warning and response 3.3 Security best practices - compliance and assurance 3.4 Security crisis management plan for countering cyber attacks and cyber terrorism 3.5 Security legal framework and law enforcement 3.6 Security information sharing and cooperation 4.0 Enabling technologies – Deployment...

Words: 7888 - Pages: 32