Premium Essay

It Secuirty

In:

Submitted By jattrisky420
Words 869
Pages 4
The information security department is responsible for writing policies, creating awareness training, tracking compliance, and generally leading the data security program at an organization. As being an IT senior system administrator, there are many tasks that have to be performed on a daily basis. You are Responsible for the technical design, planning, implementation, and the highest level of performance tuning and recovery procedures for mission critical enterprise systems. One of the main responsibilities is to develop procedures to maintain security and protect systems from unauthorized use, acts of nature and user abuse.
There are many authentication policies that can be implemented for user to help improve the network’s security. Authentication can be accomplished in many ways. One of the ways is to use password authentication where Users provide an identifier, a typed in word or phrase or perhaps a token card, along with a password. Password authentication is easy to implement but are generally weak and primitive. The fact that plain password authentication is still by far the most widely used form of authentication, gives credence to the seriousness of the lack of security on both the Internet and within private networks. I can implement this policy as long as there are various restrictions we can follow. The password has to have minimum eight characters, at least one capital letter, must use special character such #,$,%,&,@ , can’t use previous 6 passwords, has to be changed every 30 days and so on.
The other method I can use is smart cards authentication methods which are credit card-sized devices that hold a small computer chip, which is used to store public and private keys and other personal information used to identify a person and authenticate him or her to the system. Logging onto the network with a smart card requires that you physically

Similar Documents

Premium Essay

Global Secuirty

...1 BUSINESSES LOCATED IN INDIA Course Project Business Security and Globalization of Multinational Businesses Located in India John Doe Professor Juan Vigil GM594 – Global and Domestic Security Management Keller Graduate School of Management June 10, 2012 2 BUSINESSES LOCATED IN INDIA Abstract This paper will outline the background of the country of India to its present day. This will include a brief discussion on how the country has become an attractive location for businesses to establish a global footprint. In doing so, there are many aspects that must be considered when setting up a business of operations within India. Business security and what can be experienced when a business finally decides to take the step. This includes aspects of local governments, local culture, and employee pool, just to name a few. Then, there is the risk associated with doing business in India once the operation is established. This can include terrorism, government conflicts, and employee concerns. While there is a large list of security concerns for a business to consider before making this type of commitment, many can be avoided or at least minimized through proper planning. I will discuss solutions that can be implemented to reduce the amount of risk associated with the security adversity when establishing a global business within India. 3 BUSINESSES LOCATED IN INDIA Business Security and Globalization of Multinational Businesses Located in India Introduction Businesses...

Words: 3908 - Pages: 16

Premium Essay

National Secuirty

...Dominic DeBona Professor Giordano POL 105 15 March 2016 National Security National security has been an extensive ongoing issue, but it has only increased since the brutal attacks of September 11th, 2001. The war on terrorism has been dealt with since then but not as efficient as people want. Immigration has a big role in the war on terrorism as the country is unaware of certain people entering this country with the intent of performing acts of terror. With that being seen in this country too often now, the idea of closing the borders may not be the worst idea this government has ever had. Of course an extreme idea like that can lead to further issues but can also provide the country with the time to sit down and reflect on what can be done better in the future to avoid these circumstances. The people of this country might not have the best course of action to solve this issue but the government needs to work hard to fix this issue we are having on a daily basis. Nearly 3,000 people were killed instantly for the attacks of 9/11. On the day of these attacks, 19 al Qaeda members hijacked planes and performed the most lethal act of terrorism in American history. This attack raised the awareness of Islam and its teachings tremendously. There have been reports of increased sales of the Qur’an and literature on Islam, for example, and some mosques prominent Muslim community leaders have reported a surge in converts to Islam since 9/11 (Coskun 2012). The general public...

Words: 1658 - Pages: 7

Premium Essay

Data Secuirty

...Today, so many are concerned with their privacy more than ever. With the advancement of technology privacy is the biggest concern of many users. The internet is used daily by billion of users nationwide. For that reason, the internet has challenged many business owners for the responsibility of making sure their sites are secured for users to make purchases or share information. Data is the information transferred between a site and a user. The information may be personal and sometimes require a login. Most sites are secured so users feel much more secured with giving information such as date of birth, address, and social security number at times. Data security is the information that is personal that people usually only feel comfortable sharing with a reliable source. This information is usually stored in a database that requires that a company is responsible for information saved or shared. Earlier times personal information was usually stored in a fireproof box possibly somewhere in the house or a safe location. However, with the advancement of technology many have shared information through different application downloads and even through the ability to make a purchase or access a site. The information is unique and many people don’t feel comfortable sharing unless it’s a reliable source. So often, it is common that people go through identity theft. In the earlier stages of Internet, most information was hacked through email spams. The hackers used to send information...

Words: 1910 - Pages: 8

Premium Essay

Airport Secuirty

...Airport Security Design Introduction The world and the United States stood still on 11 September 2001 as terrorist attacked the United States using four jetliners. Over the course of the next thirteen months, the President of the United States along with the U.S. Congress passed a series of bills that would change the structure of the U.S. government. On 20 September 2001, President George W. Bush announces to congress the formation of the Office Homeland Security. In a speech to congress, President Bush states, “Our nation has been put on notice:  We are not immune from attack.  We will take defensive measures against terrorism to protect Americans.  Today, dozens of federal departments and agencies, as well as state and local governments, have responsibilities affecting homeland security, which includes airport security (Bush, 2001).   Of these government agencies, the Federal Aviation Administration (FAA) and the Transportation Security Administration (TSA) provides the federal guidelines, which all airports must adhere to for security. The FAA and TSA provide these guidelines through the Recommended Security Guidelines for Airport Planning, Design, and Construction, and TSA civil aviation rules, CFR 49-1542. It is up to airport operators to follow these guidelines to insure passenger and employee safety. Security Force Many airports across the United States use local law enforcement to aid in the security of their airports. However, several airports have...

Words: 3562 - Pages: 15

Premium Essay

Secuirty Term Paper

...Cyber Security Project Marci James Liberty University BMIS 520 DR. Delano May 29, 2016 Scope The world of technology is advancing ever year and people are just trying to stay up to date, but there are those in the world that make it there life to stay up on technology but in all the wrong ways. The people that are just every day users of technology do not see the people in the background hoping to gain access to their private information. As technology advances so must the ways people protect their private information; even in places that they think are new and untouchable to the normal person. Even the most technology educated person can fall victim to cyber-attacks and lose of personal data. As technology advances the world of computer security will also change; the word computer is not just referring to a desktop computer that sits a desk but now refers to your tablet, smart phone, and even smart watch. The way that personal data is saved is not just limited to a floppy disc or even a CD-ROM anymore, but now a day there is clouds that will have personal data stored from all over the world sometimes in one location. The discussion in the review below will give more detail on what is coming for technology and as well as how technology is being used against people to receive their personal data. Literature Review Technology is estimated to move even more rapidly within the next twenty years and this all new growth starts this year; with this happening it means that...

Words: 1825 - Pages: 8

Premium Essay

Secuirty in Today's World

...Security in Today’s World I believe the world of private security industry is growing each day and so is their public relation image. More and more companies, apartment buildings, and communities are hiring private security companies to secure their premises. However the public relation images of private security companies are full of mixed emotions. Most of the public see the private security industry as a good thing in the aid of police officers and protecting the community and for some the private security industry are seen as a hassle and so called “Want to be cops.” In the article The Private Arm of the Law it states, “"There is a limit to the amount of law enforcement you can expect taxpayers to support," said Ron Hodge, Durham's deputy police chief, who said some of his requests for additional officers have been turned down in recent years.” (Goldstein, 2007, para. 15). This illustrates the need for the private security industry; the need for more eyes and persons to protect the citizens and their assets is a huge task police officers cannot tackle alone. Some security officers are highly trained to act as a police officer, “the department has trained 600 security officers on elements of an arrest, how to write incident reports and how to testify in court.” (Goldstein, 2007, para. 15). With police departments training security officers and ex-police officers actually being security officers it helps them retain the same level of professionalism as law enforcement officers...

Words: 351 - Pages: 2

Free Essay

Biometrics and Information Secuirty

...Biometrics and Information Security Tremendous advancements in information technology has laid path for new networking and communication systems. These facilities attract many criminals to hack into users systems and steal their personal data. These advancements lead to more threats and better security need to be provided to user’s personal data. To ensure the security, in recent years many authentication techniques have been developed where biometrics is one of those which every organization is integrating it into their systems. The author mentions various features of today’s biometrics such as face, voice, speech recognition and fingerprints. Based on functionality of biometrics, they can be separated as Identification and verification systems. Even based on physiological and behavioral characteristics, one can identify an individual. The author’s description of new emerging technologies in biometrics such as ear shape, gait recognition, body odor, DNA matching and so on enhances the existing biometric security systems. Apart from that, incorporating more than two biometrics such face, finger print and voice recognition brings in more security into system and strengthens it against any attacks ( Deepthi, 2008). This biometric technology has been used in various applications such as banking sector, airports, passports with an electronic chip and finger print scanning to check in to office areas. Keeping up the standards and maintaining confidentiality with information exchange...

Words: 350 - Pages: 2

Premium Essay

Internet Technology, Marketing and Secuirty

...Internet Technology, Marketing and Secuirty The information technology era now has more companies than ever that sale, market, and advertises on the internet. With this convenience several problems with internet security occur on a daily basis. “Individuals, Businesses, and government agencies are all vulnerable to computer crime. Computer hackers-unauthorized users-sometimes work alone and sometimes in groups. Sometimes hackers break into computer systems just to show that they can do it; other times they have more sinister motives.” (Boone 509) In April 2011 Sony, a leading manufacturer of audio, video, communication and information technology products, experienced a security breach that effected seventy seven million Sony users. Throughout the years Sony has experienced several hacking incidents. One of Sony incidents was when George Hot, also known as GeoHot, cracked security on the Play Station 3 and then gained access to pirated games. Sony pursued legal action against Hotz, which then led to another hacker joining Hotz against Sony. The hacker “Anonymous”, which had previously hacked Gawker, Amazon, MasterCard, and computer security firm HBGary, released the following threatening statement on its site: “Congratulations, Sony” You have now received the undivided attention of Anonymous. Your recent legal action again our fellow hackers, Geo Hot and Graf Chokolo, have not only alarmed us, it has been deemed wholly unforgivable. “You have abused the judicial...

Words: 1353 - Pages: 6

Premium Essay

Business Plan- Secuirty Business

...Executive Summary 1.0 Business Concept Northern Sierra Security is the place to go in the greater Sacramento/ Capital area where the well known, rich and petrified can go to get a friendly yet terrifying faces to help secure them. This company is an upscale security company for the neurotic who might be in need of some securing. Our goal is to create an atmosphere that is a safe and sound environment for you, your family, your residence and or place of work. We will provide state of the art private residential, building or personal security, with up to date security devices as well as being able to grant you with uniformed and plain clothes officers. "Call On Us To Be Safe." 1.1 Current Situation We offer mid to high level security services. Along with our new age ideas we combine old school techniques. Our attitude is in your face without being over invasive. Our officers have been trained with the best defensive tactics and can deal with high stress situations. 1.2 Keys to Success Guarantee a safe environment. Maintaining an atmosphere tha... ... middle of paper ... ...$850,000 Other Current Liabilities 0 Total Current Liabilities $635,000 Start Up Assets Needed Long Term Liabilities Cash Balance on Starting Date $35,000 Long Term Liabilities 0 Start-up Inventory 10000 Other Long Term Liabilities $0 Total Current Assets $45,000 Total Long Term Liabilities $0 Total Requirements $805,000 Loss at Start Up ($850...

Words: 266 - Pages: 2

Premium Essay

Business Plan- Secuirty Business

...1. Executive Summary 1.0 Business Concept Northern Sierra Security is the place to go in the greater Sacramento/ Capital area where the well known, rich and petrified can go to get a friendly yet terrifying faces to help secure them. This company is an upscale security company for the neurotic who might be in need of some securing. Our goal is to create an atmosphere that is a safe and sound environment for you, your family, your residence and or place of work. We will provide state of the art private residential, building or personal security, with up to date security devices as well as being able to grant you with uniformed and plain clothes officers. "Call On Us To Be Safe." 1.1 Current Situation We offer mid to high level security services. Along with our new age ideas we combine old school techniques. Our attitude is in your face without being over invasive. Our officers have been trained with the best defensive tactics and can deal with high stress situations. 1.2 Keys to Success Guarantee a safe environment. Maintaining an atmosphere tha... ... middle of paper ... ...$850,000 Other Current Liabilities 0 Total Current Liabilities $635,000 Start Up Assets Needed Long Term Liabilities Cash Balance on Starting Date $35,000 Long Term Liabilities 0 Start-up Inventory 10000 Other Long Term Liabilities $0 Total Current Assets $45,000 Total Long Term Liabilities $0 Total Requirements...

Words: 267 - Pages: 2

Premium Essay

Principle of Information Secuirty Chapter 4 Solutions

...Chapter 4 1. Risk management is the process of identifying risk, as represented by vulnerabilities, to an organization’s information assets and infrastructure, and taking steps to reduce this risk to an acceptable level. 2. According to Sun Tzu, the two key understandings we must achieve to be successful in battle are Know Yourself and know the enemy. Know yourself First, you must identify, examine, and understand the information and systems currently in place within your organization. This is self-evident. To protect assets, which are defined here as information and the systems that use, store, and transmit information, you must know what they are, how they add value to the organization, and to which vulnerabilities they are susceptible. Once you know what you have, you can identify what you are already doing to protect it. Just because a control is in place does not necessarily mean that the asset is protected. Frequently, organizations implement control mechanisms but then neglect the necessary periodic review, revision, and maintenance. The policies, education and training programs, and technologies that protect information must be carefully maintained and administered to ensure that they remain effective. Know the Enemy Having identified your organization’s assets and weaknesses, you move on to Sun Tzu’s second step: Know the enemy. This means identifying, examining, and understanding the threats facing the organization. You must determine which threat aspects most...

Words: 963 - Pages: 4

Free Essay

Criminal Justice

...Assignment 5: Border Patrol Agent Jeremy Matkovich Strayer University CRJ 100 Within this document one will get a better understanding of U.S. Customs and Border Protection Agent. This document will present a description of the border patrol, annotated web link, an article related to the career, three professional associations that could support, and legal code according to the state of Maryland. Border Patrol Agents actively patrol the borders to prevent innocent civilians from entering or leaving the United States without government permission. [ (Schmalleger, 2011) ] Agents detect and prevent the smuggling and unlawful entry of aliens into the United States, along with apprehending those people found to be in violation of immigration laws. Agents work to lower crimes and improve the quality of life in border communities. In some areas Agents are deputized or have peace-officer status and use it to enforce local and state/territory laws. [ (Schmalleger, 2011) ] One of the most important activities for a Border Patrol Agent is "line watch". This involves the detection, prevention and apprehension of terrorists, illegal aliens and smugglers of both aliens and contraband at or near the land border by maintaining surveillance from a covert position, following up leads, responding to electronic sensor television systems, aircraft sightings, and interpreting and following tracks, marks and other physical evidence. [ (Schmalleger, 2011) ] Some of the major activities are...

Words: 1184 - Pages: 5

Free Essay

Social Security

...wonderful benefit for those who deserve it like long term workers, the elderly, etc. For as long as the baby boomers do not come back around like it's subjected to, the US is already in debt and Social Secuirty will be next. I agree with social security for the fact that it does help elderly and the workers who have worked their whole life, they deserve to get something back for their troubles and all the years they've put in. Social security does get taken advantage of though which is a downfall because there are workers in households who will only work for a month or two and then expect to be put on a social security check and not deserve it. In general, recipients begin to receive disability benefits after they have been disabled for five full months whether their disability be true or not. Those households are the ones who are putting America more and more in debt because those who are working are paying into their funds. In 2010 roughly 1,500 federal employees may have improperly received benefits based upon their wages exceeding maximum income thresholds. Disability benefits are calculated based upon a formula that takes into account the Social Security taxes paid over the course of workers' lifetimes. Once you get a certain age ev eryone will have social secuirty. Even though workers have to put in for their own social security benefits. Social Security is going down hill on a daily basis especially more in todays economy than for example in the 50's when the baby...

Words: 765 - Pages: 4

Free Essay

Ad Proceed

...PSPG IMPLAN TO LOI 40/2011 (45th ADB ANNUAL MEETING) I. SITUATION A. General Situation The Philippine Government, in coordination with the Asia Development Bank as the pilot agency, shall be hosting the 45th Annual Meeting on May 02-05, 2012 to be held at the Philippine International Convention Center (PICC) in Pasay City. OPERATING EXPENSES Breakdown of expenses are as follows: |EXPENSES |AMOUNT | |A. Food |P16,000.00 | | | | |Eight (8) persons x 500 x 4 days | | |B. Gasoline | | | | | |One (1) Toyota Innova |8,640.00 | |40 liters x P54.00 x 4 days | | | | ...

Words: 377 - Pages: 2

Premium Essay

Intel Byod

...Case : Intel BYOD Assignment Questions 1. Does BYOD increase productivity in workplaces? 2. Should it be encouraged or discouraged? 3. How might other firms benefit from Intel’s approach to security (as shown in case Exhibit 2)? 4. How can Intel turn BYOD into a new source of competitive advantage? 5. What decisions can Intel make to ensure security of the corporate data on an employee-owned device that is used in the workplace? 6. How should Intel manage BYOD in the face of its e-Discovery obligations? Pasted from Role: Malcom Harkins, chief information security officer was facing dilemnas in taking forward the Bring your own device initiative. - By 2014 at least 70% of employees would be using their own device for at least part of their job. Issue - The difference between personal data and corporate data… was no longer limited to office hours, just as peronal data was no longer off-0 limits during office hours - Employees would be distracted by applications embedded into their devices, which could potentially lead to a negatice impact on productivity - Greater risk in data security - Intel neded control over to access and control company info.. But doing so on employee devices would violate privacy Benefits - Reduced intel's hardware cost because employees bought their own hardware but increased cost in supporting , configuring those devices - Lower cost in data because telecom charged 33% less for personal vs corp data.. Approaches - Do nithng.. And hope that bringing in own...

Words: 527 - Pages: 3