Information assurance is a very critical issue within the 21st century. The rise of hackers in a technology dependent world has not only affected individual consumers, but also businesses and governments. Personal lives are being affected by data breaches every day due to the increase of cyber criminals that are attacking databases of various companies such as Target and Home Depot. The education that I expect to receive from Regis University and the MSIA program is one that will not only help me understand how to resolve these current threats that affect different sectors, but also one that will prepare me to be ahead of the threats within the future. I expect to understand what are the security issues that allow hackers to be successful in …show more content…
As an online digital printing company that is dependent and based on the cloud, this means that all of our information is online and anyone who is interested enough can spend some time to try to hack into our database and cause malicious damage. This would affect the entire company, our customers, and our customers ' customers. Everyone who is dependent on our system would be affected if a data breach were to occur. When I first started in the Software Development position, I had to set up my own development station and connect to a remote database, which I found out was all too easy to do and seemed somewhat insecure. However, I became more interested in working with issues within the database when I learned how easy it was to manipulate the data in the live database to fix urgent problems that were caused by glitches within the processing of customer …show more content…
I envision myself in a position where I am a critical member of an organization that helps protect information and thwarts security attacks on databases. I look forward to working in a place where my skills will be constantly put to use as an information security analyst, network administrator, or security consultant. It is not often that you hear about women leading in cyber security. I do envision myself to be one of the many women who are breaking the mold in the information assurance industry.
We are hardly ever provided the reasons as to why cyber criminals were successful in hacking into a database, or what the organization is doing to increase the level of security on their systems. I want to become one of the people who investigate these incidents, resolve them, and make sure that it does not happen again. I want to help the victims of these cyber criminals by making sure that they are not victims again, but also to track down and identify as to who is responsible for these attacks on both individuals and
Whitman, M., & Mattord, H. (2010). Management of information security. (3rd ed., p. 6). Boston, MA: Cengage Learning.
When it comes to cyber crimes we can’t put a face to the crimes being committed, it’s easier to find ways to prevent hackers from gaining access to important data than searching and putting them in handcuffs. Traditional police theories will not work for cyber crimes, so cyber police theories need to be developed.
Students earning the Master’s Degree in Cybersecruity through UMUC are provided a distinctive opportunity. The capstone course for the degree program allows students to put the knowledge they have gained throughout the program into practice. The Cybersecurity Capstone Simulation presents students, organized into teams representing business sectors, with various scenarios in which a cyber threat must be addressed. Furthermore, the simulation stresses the need for the teams to consider other impacts on the implementation of security control, such as employee morale, productivity, and profitability. One of the greatest challenges of the simulation is to implement controls which will defend the sector’s systems, yet still provide
Security helps the organization meet its business objectives or mission by protecting its physical and financial resources, reputation, legal position, employees, and other tangible and intangible assets through the selection and application of appropriate safeguards. Businesses should establish roles and responsibilities of all personnel and staff members. However, a Chief Information Officer should be appointed to direct an organization’s day to day management of information assets. Supporting roles are performed by the service providers and include systems operations, whose personnel design and operate the computer systems. Each team member must be held accountable in ensuring all of the rules and policies are being followed, as well as, understanding their roles, responsibilities and functions. Organizations information processing systems are vulnerable to many threats that can inflict various types of damage that can result in significant losses (Harris, 2014). Losses can come from actions from trusted employees that defraud the system, outside hackers, or from careless data entry. The major threat to information protection is error and omissions that data entry personnel, users, system operators and programmers make. To better protect business information resources, organizations should conduct a risk analysis to see what
needed. There are numerous theories and ways to prevent cyber crimes, to ensure cyber security,
Cybersecurity is the technology that protects computers and networks from unauthorized personnel. Ever since computers have expanded to homes and the workplace; the need for cyber security has grown exponentially. Millions of people around the world have access to the internet at a given time, and this allows for predators to attack, scam, hack, and intrude on personal and government information. Cybersecurity is designed to counteract these attempts to ultimately allow for safe networks and computers.
The Pros and Cons of Database Replication If business leaders conduct a risk analysis of this decision and consider the implications from the perspective of information security, the notion of centralizing a service in a single location and entrusting that location to provide that service to other, geographically separate locations, is troubling for several reasons. The risks associated with centralizing the database server, with no off-site replication, include degraded performance and a lack of business continuity and disaster recovery capabilities in the event of an unplanned event. Information security concerns itself with three primary tenants: confidentiality, integrity, and availability. Confidentiality, of course, refers to the privacy
My strong curiosity towards the field of Cybersecurity dates back to my pre-university days when I started reading sci-fi novels. Digital Fortress, a techno-thriller novel written by Dan Brown, explored the theme of government surveillance, security and civil liberties. This theme is brought out in the book by portraying cryptographic techniques, security policies and implications of these policies. This gravitated me towards the field of security. With little programming experience, I was eager to begin my nascent adventure in the field of Cybersecurity. Although I’ve gained exposure in the field of security during the course of my Bachelor’s degree, I believe pursuing a master’s degree in Cybersecurity will allow me to explore the field of security in greater depth and utilize it effectively to address more real-world challenges.
...., credit card numbers). Next, the article addresses database security in that they are not “inherently secure” which leads to how does one make sure to properly secure databases and the data that resides within. According to the author, the thirteen essentials include monitoring database performance while noting unusal activity to identify threats, using security tools to monitor database unauthorized activity, and testing regularly to ensure the database is properly defended from potential tactics used to attack it. The author concludes that security is a priority and the “most important part” of the job when working with databases. The material presented in this article is relevant to my topic for databases and the database security trend. It serves as a starting point for more research to fully understand all security essentials when working with databases.
Information security refers to “the process and methodologies that are designed and implemented to protect print, electronic, or any other form of confidential, private and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption” (SANS Institute, n.d.). Information security programs are important in maintaining confidentiality, integrity, and availability (figure 1 page X). For example, a Trojan horse was planted on your system and result in the loss of customers’ personal and financial information. This failure to protect data will result in a loss, legal liability, and goodwill. In this scenario, both confidentiality and
Hackers and cyber criminals are very clever when it comes to manipulating computer based programs or devices. Since cyber crimes are a worldwide problem, all police departments need the resources available to investigate crimes in their jurisdiction. As an example, my mother had realized that she was a victim of computer fraud last week. She called the local sheriff’s office to report it, but they had referred her to the state police department because they didn’t have the resources available to investigate her claim. When the state police investigated, they had determined that the source was from Nigeria and that there was nothing they could do. Since there are no jurisdictional boundaries online, it is extremely difficult to investigate and successfully prosecute cyber crimes. Law enforcement needs the most up to date technology to ensure cyber criminals don’t operate out of reach from the
The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad. The following report will provide you guidance about auditing and hardening techniques applied though the 7 Domains by utilizing IT Security Best Practices.
National Institute of Standards and Technology. (2012, March/April). Basing Cybersecurity Training on User Perceptions. (IEEE Report 1540-7993/12). (pp. 40-49). Retrieved from University of Maryland University College IEEE Computer Society website: http://www.computer.org.ezproxy.umuc.edu/portal/web/csdl
In today’s world Costumer is back bone of the business if we cannot attract the customer towards your product or service enterprise cannot survive in today’s market. In order to achieve the customer satisfaction we should have advanced or modern technology in place and also costumer services managers. In establishing a company we should know what is BIS and how we can connect BIS with CRM.
The advantages of technology and the internet have led more criminals to use cyberspace to commit crimes. The threat of cybercrime is increasing as globalization continues to spread across the world. While the impact of globalization has led to amazing, new discoveries throughout the world, Internet connectivity has also made cybercrime easier. America and the rest of the world have become more reliant on technology and use it in more aspects of their lives, technology-users make themselves more vulnerable to cyber attacks. Globalization and the growing use of computers in the world have given people a motive to learn more about computing and become more knowledgeable as programmers. As these people learn more, there is a risk that they will use their new intelligence to commit cybercrimes.