Free Essay

Keeping Information Secure

In:

Submitted By abbied
Words 1741
Pages 7
Keeping information secure in the workplace

Hacking

A hacker is a person who breaks codes and passwords to gain unauthorised entry to computer systems. A system hacker knows about designing and maintaining operating systems and a password hacker knows how to find out someone else's password.

Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers enjoy learning more about how computers work and get excitement out of cracking the security of remote computer systems. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills.

The purpose of hacking could be anything like to get money illegally, destroying the network, stealing, for the fun or some other motives as well. There are very small numbers of computer hackers in the world because hacking requires lot of knowledge.

To prevent this from happening
Network security
Your business needs to stay on top of changes that could affect the security of your LAN. Keep your operating system updated with the latest security patches and bug fixes. Assign access to directories and other network resources on a need-to-have basis, and remove a user's account immediately when they leave your company. Use network logging and security tests to check your network for security holes and possible break-ins.
Passwords
One bad password can compromise your entire network. Avoid passwords that contain dictionary words or personal information, and require users to change their passwords regularly. When an employee leaves the company, disable their password immediately as part of the termination process.

Viruses

Computer viruses are programs written by people who set out to harm or destroy another person’s data. These virus programs are placed into emails or files so that program will run the attached virus program, therefore, it is said that the virus infects the file or program. They take the term virus from the biological word, because they do just what a real virus would do to a human.

A virus is inactive until you execute an infected program or application or start your computer from a disk that has infected system files. Once a virus is active, it loads into your computer's memory and may save itself to your hard drive or copies itself to applications or system files on disks you use.

Some viruses are programmed specifically to damage the data on your computer by corrupting programs, deleting files, or even erasing your entire hard drive. Many viruses do nothing more than display a message or make sounds at a certain time. Other viruses make your computer's system behave erratically or crash frequently. Sadly many people who have problems or frequent crashes using their computers do not realize that they have a virus and live with the inconveniences.

To prevent this from happening
Purchase anti virus software
Purchase and install an antivirus program such as Kaspersky Antivirus, Norton Antivirus or McAffe Antivirus on every computer attached to the network. This is the only way to protect them all against infection. Some companies provide discounts or bulk licenses for multiple
Keep anti virus software updated
Keep all antivirus programs updated. An antivirus program that isn't updated will not prevent new virus infections. Update all the antivirus programs on the network when they're installed and schedule regular updates.
Install firewalls
Install software firewalls on all of your computers. Installing a software firewall is important in preventing worms from spreading in your network. A worm is like a virus, but instead of using files or emails to spread, it will exploit vulnerabilities in networked computers. Worms are often so effective that every computer on your network can be infected in minutes.

Fraud

Fraud means to pretend you are someone else and use their money, accounts to buy things or subscribe to things in their name. Fraud has been around for a long time, it is not something that has only recently arrived with the Internet.

With more consumers discovering the convenience of e-commerce they now feel comfortable purchasing goods and services online. As the internet continues to thrive with technology and millions in sales, the malicious crime of fraud has become a bigger issue.

These individuals who do this crime have easy access to advanced software that enables them to manipulate your computer to obtain the sensitive information they want. To make matters worse, you can be a victim of computer fraud without even knowing your machine has been compromised.

It is important your business protects itself from this because many businesses are not doing enough to protect their own data and that of employees and customers.

Data misuse

Copying and illegal transfer of data is very quick and easy using online computers and large storage devices such as hard disks and CDs. company research, written work and Personal data such as your customer’s names and email addresses they provided for payment processing, can all be copied without permission.
The thing that is worth the most to any company is their data. If a machine breaks down or gets stolen, a company can go out and buy a new one to replace it. It costs them a big amount of money, but they can probably find the money from somewhere.
Where as, if they lose their data, this is very hard to replace. For example they could lose their customer list, lose their sales records, lose their accounts or lose all the information about their product.
To prevent this from happening
The best way to protect against this is to encrypt the data and place it into some sort of restricted access controlled tracking repository such as a document management system.

Such systems prevent any access without a password and will record the details (time, terminal, logged in ID) of both successful and unsuccessful access attempts. This provides traceability and so deters casual miss-use.

This also typically permit access to specific records in limited sets i.e. you can search for any record but the system will never show you more than a few hits at one time, this prevents easy access to, and copying of, the entire database.

Unauthorized transfer or copying

Unauthorized transfer is this includes copying music and movies with computer equipment and distributing it on the Internet without the copyright holder's permission. This is a widespread misuse of both computers and the Internet that breaks copyright regulations.

Unauthorized transfer or copying can be very easy using large storage devices such as hard drives, CDS and USB pen drives. Any type of data can be copied all too easy without permission if the branch does not have secure processes in place.

Adware, Spyware & Malware
Adware or advertising supported software is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. It is typically used to place ads on your computer. If you’re visiting a well-known Web site from a legitimate company, and lots of pop ups appear its likely that those pop up ads might not have come from that company at all. It could be that some adware running in the background is generating the ads and displaying them as if they were a part of the company’s Web site.
Spyware is software that hides itself somewhere on your computer collecting information about you and what you do on the internet. It can invade your privacy by passing on your personal details without you even knowing that this is what it is doing. Typically, spyware might transmit things like passwords, information about your operating systems, network share information, or even information about your domain structure. If you shop on the internet using your credit or debit cards some spyware can record your credit card details. Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and loss of internet or functionality of other programs. In an attempt to increase the understanding of spyware, a more formal classification of its included software types is captured under the term privacy-invasive software.
Malware is another form of spyware. It's short for malicious software and is often designed to cause damage to your computer system just like a virus does.
To prevent this from happening

Be careful where you download, don’t download from sites you don’t trust.

Download anti-virus software.

Read the pop up before You Click, Sometimes when you visit a web site a text box might pop up. Many users simply consider these a nuisance and will just click away to make the box disappear. Stop to read the message before you click ok.

E-mail and chat room abuses
Unnecessary and badly written e-mails cost companies in the UK millions each year, according to the latest research by business-writing consultants Emphasis.
According to research from the company, employees in many British companies engage in time-wasting e-mail practices that cut into worker efficiency and drive down profitability. All of this comes as the volume of business mail rises steadily in the UK, forcing workers to cope with ever-increasing mountain of messages in their inboxes.
Much of this e-mail traffic is unnecessary. Often messages are copied to colleagues, or many people e-mail their colleagues when it would have been easier to pick up the phone or even to walk to their desk and talk to them.
This overuse, along with poorly written e-mails, can cost some companies up to £10,000 per person, per annum, senior staff at some of Britain's biggest firms told Emphasis. One FTSE 100 firm reported annual e-mail costs of £39 million.

Computer Crime General Information
Computer crime is any criminal act which is committed using ICT. Where there are ways to make money, there will be criminals just waiting to take advantage.
The growth of the ecommerce has provided criminals with a whole load of different methods to try to steal from you.
There are various reasons why these computer criminals do this, it could be to: • Steal money • Steal data or information • Steal someone's identity • Damage or disrupt someone's system for revenge • Cause general havoc for fun • Copy software / films / music to avoid paying for it.

Similar Documents

Premium Essay

Security Breach Action Plan

...when working in any health care arena. There are individuals who are looking to take information which does not belong to them for their gain. When individuals are able to obtain this information for personal gain it is known as identity theft. This paper will look at the occurrence at St. John’s Hospital and discuss what should have been done with the patient documents, what actions, if any, should these personnel take toward the actions of the cleaning staff. Also this paper will discuss the actions, if any, that should be taken by IS for the management plan and code of conduct. Security Breach The administrative department has been notified that there was a security breach in the handling of protected client information in concerns to policies and procedures. On a number of occasions, employees who work late into the evening have seen the house keeping staff reading unwanted records. This is a direct violation of the Health Insurance Portability and Accountability Act (HIPAA) Laws. These laws are put into place for patient protection. This breach of security took place in a department of restricted-access, and certainly should not have transpired. Any unwanted patient records should be shredded before being discarded in the trash. When a document is thrown away like the records were, all information is open to the public and now considered a breach of privacy. Discussing patient information in areas such as: waiting rooms, hallways, elevators where people can overhear the...

Words: 1895 - Pages: 8

Premium Essay

Storing Information

...updating the old data storage system with the new storage procedures that should be put in place in the laboratories of the new build. You need to justify why the funds from the budget should be given to implement the new data storage system. Grading Criteria * P4:Describe the procedure for storing scientific information in a laboratory information management system * M4:Explain the processes involved in storing information in a scientific workplace * D3: Discuss the advantages gained by keeping data and records on a laboratory management information system * Grading Criteria * P4:Describe the procedure for storing scientific information in a laboratory information management system * M4:Explain the processes involved in storing information in a scientific workplace * D3: Discuss the advantages gained by keeping data and records on a laboratory management information system * How Do I Do It? 1. For P4, learners must describe the procedures for storing scientific information in a laboratory information management system (LIMS). A prepared list of scientific data is provided below. Learners must decide which sets of information could be stored on a workplace record system. 2. For M4, learners must explain how scientific data and records are stored....

Words: 1219 - Pages: 5

Premium Essay

Help with Task 3

...updating the old data storage system with the new storage procedures that should be put in place in the laboratories of the new build. You need to justify why the funds from the budget should be given to implement the new data storage system. Grading Criteria * P4:Describe the procedure for storing scientific information in a laboratory information management system * M4:Explain the processes involved in storing information in a scientific workplace * D3: Discuss the advantages gained by keeping data and records on a laboratory management information system * Grading Criteria * P4:Describe the procedure for storing scientific information in a laboratory information management system * M4:Explain the processes involved in storing information in a scientific workplace * D3: Discuss the advantages gained by keeping data and records on a laboratory management information system * How Do I Do It? 1. For P4, learners must describe the procedures for storing scientific information in a laboratory information management system (LIMS). A prepared list of scientific data is provided below. Learners must decide which sets of information could be stored on a workplace record system. 2. For M4, learners must explain how scientific data and records are stored....

Words: 1217 - Pages: 5

Premium Essay

Unit 2 Btec L3 Science

...updating the old data storage system with the new storage procedures that should be put in place in the laboratories of the new build. You need to justify why the funds from the budget should be given to implement the new data storage system. Grading Criteria * P4:Describe the procedure for storing scientific information in a laboratory information management system * M4:Explain the processes involved in storing information in a scientific workplace * D3: Discuss the advantages gained by keeping data and records on a laboratory management information system * Grading Criteria * P4:Describe the procedure for storing scientific information in a laboratory information management system * M4:Explain the processes involved in storing information in a scientific workplace * D3: Discuss the advantages gained by keeping data and records on a laboratory management information system * How Do I Do It? 1. For P4, learners must describe the procedures for storing scientific information in a laboratory information management system (LIMS). A prepared list of scientific data is provided below. Learners must decide which sets of information could be stored on a workplace record system. 2. For M4, learners must explain how scientific data and records are stored....

Words: 1219 - Pages: 5

Premium Essay

Security Policy Framework

...organizations grow, and rely more on information systems as the primary means of conducting operations, keeping those systems and its information secure has become one of the biggest priorities ever. In order to ensure information security, the organization must take appropriate security measures to make sure that no information is put in the hands of unauthorized personnel. Having a comprehensive information security framework in place along with sound standard operations procedure (SOP), and policies and regulations can help any organization keep its systems and information secure. When developing a framework for any organization you must choose what will be best for that organization, although the NIST (SP 800-53), ISO/IEC 27000, and COBIT all are frameworks that offer many different security programs, there is no wrong framework to choose, but choosing the one that works for your organization can be a tough decision for any manager to make. With the insurance organization I would choose to implement the ISO/IEC (27000) framework. That way we can concentrate on establishing and managing an IT security program. The ISO/IEC covers information security standards that are published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) that develop and publish international standards. By using this framework we can provide all necessary best practices that have been recommended on information security management, risks...

Words: 1310 - Pages: 6

Premium Essay

The Expanded C.I.A. Triangle

...ring sensitive information, whether it is personal or business related, is vital to the integrity, if not survival of the entity that it belongs to. Personal information can be items like a social security number or a birth date, while sensitive business information can be either patented designs or even customer contact databases. Keeping information like this secure requires methodologies such as the usage of the three tenants of information or otherwise known as the C.I.A. triad (Kim & Solomon, 2011). The three most important parts that makes up this triad are: “Confidentiality”, “Integrity”, and “Availability”. The expanded version of the C.I.A. triad actually contains seven critical characteristics that further emphasize the important role of keeping sensitive information secure. The following paragraphs will explain the nature and detail of each of these seven characteristics. The first characteristic of ensuring information security is confidentiality. This characteristic defines who or what has authorized access to an entity’s sensitive information. The overall goal of this characteristic is to keep access to this information restricted to only those that need to know. A good example of confidentiality is where a car company’s authorized car design team has access to confidential design schematics on a secure computer server for a particular new car but the car company’s competitor does not. Integrity is the next characteristic whereas its goal is in...

Words: 274 - Pages: 2

Premium Essay

Identity Theft and Fraud

...fraud. If someone going on vacation that person should ask the post office to hold all their mail until that person came back, to prevent identity theft and frauds. People should invest in a shredder to shred unwanted information. Use a secure website to access information, never enclose personal information by the phone. Check bank statement and credit card statement very careful each month to see any unwanted purchase. If that person sees any unwanted purchase notices their credit card immediately. Thesis: One day you receive a call from your bank, stating you had just made a purchase for a random estimate of 5,000 dollars. But you did not go on a shopping spree. Your identity just has stolen. How secure is your identity? Do you ever wonder about your identity? Ways to prevent/protect yourself from identity theft and frauds. I. One thing you should be aware about is your bank account. A. Once your ATM has been compromises change your pin right away. B. Get new ATM cards if it has been compromised. C. Contact the bank if you see any suspense in your bank account. I. Another way is keeping your social security secure in a safe. A. Do not write your Social Security card piece of paper. B. Do not give out your personal information to strangers. II. Monitoring your Credit Card Statements A. Check your credit card statements regularly. B. Contact the authorities about any suspension regard to your credit card transaction. III. Another...

Words: 2515 - Pages: 11

Free Essay

Threats and Risks Associated with a Small Business Network

...e-mail, or it could be someone sabotaging internally. Another way could be the use of hardware, such an external hard drive, thumb drive etc. Even as simple as a cell phone could interrupt the security of your network. We will be taking a look at ways to secure a business network from the cybercriminals that our out there trying to disrupt the security of the network systems. 1. We can do a risk assessment 2. We can educate the users 3. We can use packet filtering on the router 4. We can use antivirus software at the gateway and on the desktops Harden your systems by getting rid of useless applications These are just a few ways on getting started on securing your network. We can start looking at different software options that will help in securing your network. Let’s take a look at what’s out there for free, you have Microsoft securities that you can download for Free. You have AVG is another that is free, you have Malware Bytes also as well. These are just a few downloads that are free that work if you’re on a tight budget and just getting started. Also when using products like these, you want to make sure you keep track of your daily updates to make sure they’re current. This helps in keeping the free software updated for your security. Another thing you need to worry about is how honest are the people that are working for you? Depending on the size of your company and what business you may be in, it might be a good idea to get full back checks on...

Words: 582 - Pages: 3

Premium Essay

Eating, Substance Abuse, Sex/Gender/Sexual, and Personal Disorders

...Keeping records secure by not disclosing any information to outside sources, keep patients information where it can’t be seen by others. Never talk about patients, their conditions, or give out their names to anyone. When an employee is asked about a patient respond by saying I can’t give out that information. Make sure you have the patients permission before telling other their condition. When avoiding medical error have someone else check with you, check the medication with the doctors orders , and if unsure contact the doctor. You should always check the arm band of the patient before giving any procedures and then check the records to make sure there is no error. If in dought talk to the patient then contact the doctor. Keeping records secure by not disclosing any information to outside sources, keep patients information where it can’t be seen by others. Never talk about patients, their conditions, or give out their names to anyone. When an employee is asked about a patient respond by saying I can’t give out that information. Make sure you have the patients permission before telling other their condition. When avoiding medical error have someone else check with you, check the medication with the doctors orders , and if unsure contact the doctor. You should always check the arm band of the patient before giving any procedures and then check the records to make sure there is no error. If in dought talk to the patient then contact the...

Words: 251 - Pages: 2

Premium Essay

Nt1310 Unit 3 Assignment 3

...It is important to keep your information secure while doing anything online. To do this any device used, including tablets and smartphones, need to be protected. “Protection needs to be higher during high usage periods like the holidays as scammers and cybercriminals can target shoppers.” One way to precaution of when shopping online is to “avoid emails that ask us to act quickly or go through multiple attachments.” Some ways to protect yourself from scammers and cybercriminals are to “conduct research on your website by reading reviews, throw out any links from emails, posts, or messages that seem to be questionable, value your personal information like money, use safe payment options, read the policies of your item in case the purchase doesn’t please you as you wished, and protect your money by checking the website address to see if the extra security measures are being taken.” “Some basic tips for safety and security are to keep your device clean, make sure your login is secure and hard to get into, make your password a sentence, and have a password for every account.” Cybercrimes happen more than one would think, making it especially important to follow those tips earlier stated. According to bjs.gov, “in 7818 businesses: •...

Words: 605 - Pages: 3

Premium Essay

Week 3 Reflective

...evaluating and providing recommendations regarding information technology software, network, information security and systems. Information is the crown jewels of business. Information Security is most important key of any successful or well set organization. The manufacturing records, sales records, financial records, customer records are all kept on computers (in form of spreadsheets). In today's networked world, these may be accessible from anywhere, via the Internet. One can't be too sure that all your digitized information is secure Information security is the practice of defending information from unauthorized access, uses, modification, recoding and destruction. In general term there are various way of restricting information to the right person either electronically or physically. So in this context Security :: Password Manager Software will play a very big role for information security. Tools and resources are dedicated to information security • The best way to keeping the data or information secire is “Access control”. • Keep your system up-to-date. • Campus border firewall. A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in hardware, software, or a combination of both. • Single sign-on security. Passwords and digital identities. The key to effective identity management is good password management • Encryption. Encryption converts data into a secure form that can be safely transferred and helps JP MORGAN...

Words: 681 - Pages: 3

Premium Essay

Homework

...professionals improve patients care and the efficiency of delivering healthcare. These forums have been known to provide medical professionals with fast and secure exchange of health information for patients, pharmacies, laboratories, insurances, and other providers. A Benefit of Healthcare Forums Some patients may find web-based healthcare a plus cause they do not have to see their physician for little things like medication refills, viewing labs, diagnosis, and medication lists (EHR Bloggers, 2010). The number one benefit many will agree is quite amazing is emailing their physician and knowing the messaging system is secure. Patients have been known to pay extra to have more access to their primary physician (EHR Bloggers, 2010). This saves physicians and patients from having to see one another for unnecessary visits. Web-based healthcare systems can allow physicians to reveal test results to the patient through an e-mail or logging into their facilities site. This will save the physician time and the patient from having to pay an unnecessary co-payment. Maintaining Patient Confidentiality Virtual healthcare forums have to maintain patient’s confidentiality. Even though the facility may offer a web-based forum they still have to abide by HIPAA and HITECH Act. These two acts makes sure patients information is kept secure...

Words: 897 - Pages: 4

Premium Essay

Intro to Computer Security

...CSS150 – Introduction to Information Security Phase 5 Individual Project Kenneth A. Crawford Dr. Shawn P. Murray June 23, 2013 Table of Contents Phase 1 Discussion Board 2 3 Phase 1 Individual Project 5 Phase 2 Discussion Board 8 Richmond Investments: Remote Access Policy 8 Phase 2 Individual Project 11 Richmond Investments: LAN-to-WAN, Internet, and Web Surfing Acceptable Use Policy 11 Phase 3 Discussion Board: Blaster Worm 17 Phase 3 Individual Project 19 Phase 4 Individual Project: 4 Methods to Keeping Systems Secure 22 1. Keep all software up to date: 22 2. Surf the web cautiously: 22 3. Be cautious with e-mail: 22 4. Anti-Virus Software: 23 Phase 5 Individual Project: 4 Methods to Keeping Systems Secure 24 1. Firewalls: 24 2. System Backups: 24 3. Passwords: 25 4. File Sharing: 26 References 27 Phase 1 Discussion Board 2 The “Internal Use Only” (IUO) data classification includes all data and information not intended for public access. The best way to describe this classification is all company and client information that we do not want to see in a newspaper or on the internet. Some examples of this are: Client lists, Client account numbers, Human Resource files, Payroll files, E-Mails, and many others. This data classification affects all seven IT domains. The first and most important IT domain that the IUO affects is the “User Domain”. The users have to be taught general security and proper use of the systems...

Words: 5085 - Pages: 21

Premium Essay

Medical

...With the completion of the assignment from week four, questions six thru twelve are the questions that discuss the similarities and differences in circulation, tracking, and the security measures for handling and the storage within small, medium, and large facilities. Going question by question to review and to draw conclusions about the similarities and differences in these different size facilities. Question six states if paper records: How many different locations are there in your department that patient files may be found? From this I can conclude that smaller offices that use the paper filling system instead of electronic more than likely have less holding space for the medical records while medium and large facilities may have more holding stations, but now usually have less than a small facility does because they more electronic records than paper. Question seven, if paper records: Is there a need to chart the circulation of files from one location to another, so that your staff knows where files are kept? What I can conclude form this question is that no matter what size facility the staff is working in, there should be some sort of organization process or filing system, either alphabetical or numerical order of the patient’s medical records and they should not have to be circulated from one location to the next so that each staff member knows where it is located. In question nine, what can cause the biggest problem for records management if it isn’t done right? I also...

Words: 757 - Pages: 4

Free Essay

Project Part 4

...to help him to ease his concerns. This plan will include the following: * Keeping the database secure * Allowing users certain access to specific parts or tasks * Allowing for back up of information * Keeping the database safe from outside factors Vince Table Name | SELECT | INSERT | UPDATE | DELETE | Constraints | Album | X | X | X | X | | Customer | X | X | X | X | | Purchased | X | X | X | X | | Request | X | X | X | X | | Employee Table Name | SELECT | INSERT | UPDATE | DELETE | Constraints | Album | X | X | X | | | Customer | X | X | X | | | Purchased | | | | | | Request | X | X | X | | | For the authentication of the database, each user would have a login and password to enter in order to access the database. Each login will be set with a specific permission set to help them perform the duties they are required to do in the database. Also we will set up certificates to make sure that a request is coming from a known source. Role | Vince | Threat | Description | SELECT | Would not knowingly attack the database | INSERT | Entry mistakes can make the data incorrect | UPDATE | Updating more records by missing WHERE criteria which results in bad data | DELETE | Accidental deletion of records | Role | Employee | Threat | Description | SELECT | Would not knowingly attack the database, see other tenant information | INSERT | Entry mistakes can make the data incorrect | UPDATE | Updating more...

Words: 435 - Pages: 2