Monday, April 29, 2019
Cyber Security and Information Security Assignment
Cyber Security and Information Security - denomination ExampleFor example, Phneah (2013) suggests that previously, dangers from inside the familiarity were previously more about financial shifts, but now bodily espionage is becoming a bigger take chances. This may be beca expend the benefits that come from understanding the organizational structure and what the company is working on may be extremely beneficial to some individuals, and there be those that are willing to pay more to understand how the company works. The article does note that the relative risk is changing, because Phneah (2013) suggests that insider risk may actually become more important from the dangers from outside the organization. Another interesting thing to take in is that there may be a risk from collaboration between insiders and outsiders, which could pose a real risk to information security. The risk is noted to be changing because organized crime groups understand that they coffin nail cause a rou nd of damage (for financial game or types of terrorism) by using insiders to uphold the attacks. The change may also be due to the fact that many corporations are aware of the risk from outside the company, and thus information security has been tightened up in the last decade making it truly difficult for outsiders to attack without relevant passwords or passkeys. The collaboration therefore combines psyche who already has access with someone who wants to commit serious attacks. Phneah, E. (2013, August). Insider threats evolving, still main risk ZDNet. ZDNet. Retrieved August 30, 2013, from http//www.zdnet.com/insider-threats-evolving-still-main-risk-7000003491/ 2. Search your institutions produce documents, including its Web pages. Locate its mission statement, vision statement, and strategic goals. Identify any references to information security. Also formula for any planning documents related to information security. From the website, UMUC has the mission statement to pro vide good-quality, affordable and accessible raising as part of the state of Maryland. The vision statement suggests that it aims to be a part of the greater campaign to allow more people to get a college degree regardless of their circumstances, although this is not stated explicitly on the website. The strategic goals of the institution are to achieve the mission and vision by providing a lot of online courses and having campuses in many locations. This increases accessibility. Additionally, there are several references to financial aid which can be tending(p) as a way of helping more people attend UMUC. There are not that many references to information security, but the website does have a secure sign-in area for students and faculty designed to obligate important information secure and personal to the individual. Chapter 3 P.114 4. Using the format provided in the text, design an casualty response plan for your home computer. Include actions to be taken if each of the follo wing events occur virus attack Power failure Fire Burst water pipe ISP failure What other scenarios do you think are important to plan for? Type of Event Virus Attack Potential slander Files could be corrupted, private and personal information could be taken and used in malicious and fell ways Precautions Install anti-virus software and keep it updated regularly to prevent against potential attacks Actions to Take Immediately use anti-virus software to identify the type of virus and the damage it could do. Use the software to remove the virus if possible, if not try to
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.