Essays.club - Get Free Essays and Term Papers
Search

Information Systems Risk Management

Autor:   •  November 23, 2017  •  1,472 Words (6 Pages)  •  736 Views

Page 1 of 6

...

One last area that should be addressed in any corporation is the Internet usage and what sites that are visited. Filtering content in HTTP and e-mail communications at the network perimeter is the best way to check for and block sensitive information from going out to such sites (Beaver, 2015). Keep in mind that even though a company utilizes the most secure software, there is always that chance that company information may escape out via encrypted programs or from personal devices.

These are just a few examples that could help reduce Riordan Manufacturing from becoming a victim of hacking. Today, we live in the world where anyone has the ability to abuse the information security systems put in place by a big corporation. We also live in the “third wave” of the information society, and undoubtedly, abuses in information security resulting in computer crime and cyber terrorism will only grow in the future (Taylor, Fritsch, & Liederbach, 2015, p. 343). If implemented correctly, these technical safeguards will only work for a very short time, and updates or corrections will have to be made to correct any wrongdoing within the software breaches. However, for a business with a long-term value, he or she has to ensure that the company’s policies are strictly adhered to. Because the individuals committing these attacks will no longer be the relatively uneducated “crook” of the past, but he or she may well be a very sophisticated criminal, a greedy inside employee, a highly motivated terrorist, or the agent provocateur from a rogue government (Taylor, Fritsch, & Liederbach, 2015, p. 343). If done correctly and joined with employee alertness and proper security measures for determining if the countermeasures are working properly, can provide outstanding protection against internal or external threats around the world. Because in the end, it all boils down to one person in any business or corporation, and that person is the employee.

---------------------------------------------------------------

References

Beaver, K. (2015). Five common insider threats and how to mitigate them. Retrieved from http://searchsecurity.techtarget.com/tip/Five-common-insider-threats-and-how-to-mitigate-them

Kark, K. (2015). Create a data breach response plan in 10 easy steps. Retrieved from http://searchsecurity.techtarget.com/tip/Create-a-data-breach-response-plan-in-10-easy-steps

Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital Crime and Digital Terrorism (3rd ed.). Boston, MA: Pearson.

Whittle, S. (2008). The top five internal security threats. Retrieved from http://www.zdnet.com/article/the-top-five-internal-security-threats/

...

Download:   txt (9.5 Kb)   pdf (82.4 Kb)   docx (12.3 Kb)  
Continue for 5 more pages »
Only available on Essays.club