In our world of continuously increasing dependence on technology in our personal and professional lives, the successful implementation of cyber security is becoming more essential than ever. The amount of data emitted by people on a daily basis is immense, and companies like ChoicePoint constantly gather this data. These companies compile data to sell to other entities in order for those organizations to make many business-related conclusions, including decisions related to investing, advertising, and even whether or not to issue credit or insurance to individuals. Companies like ChoicePoint, LexisNexis, and Acxiom garner a lot of power in the business world because they “know” so much about potential customers. However, if a company who holds that power loses control of it as ChoicePoint did, they not only lose credibility with their competitors and prospective clients, but they also put thousands of people at risk for identity theft and other negative ramifications that arise from a security breach of the magnitude that ChoicePoint experienced. According to the article, “Management’s Role in Information Security in a Cyber Economy,” security for an organization’s assets is not a matter of firewalls or biometrics, but rather the implementation of a systemic cyber-security policy that starts with top management and trickles down to every aspect of the organization. This top-down approach helps to ensure that cyber-security is made a part of the organizational culture, and is not just viewed as something the information technology department of the company should be concerned with. Another fact stated by the article is that an organization cannot completely secure their entire collection of assets. It would be impossible for a company to accomplish such a task, so they must accurately identify and categorize their assets to determine what needs to be secured, and what is less important. The organization should then implement a comprehensive policy to define what resources should be expended to insure sufficient security, the actions that need to be taken to maintain a secure organization, and the course of action that should be followed should a security breach occur. In the case of ChoicePoint’s security breach, they attempted to implement a top-down privacy regulation through the reorganization of their company policy relating to fraud detection and cyber security. However, the effort was too-little-too-late following the successful breach by a fraudulent “small business,” which effectively thwarted ChoicePoint’s safeguards and gave outsiders access to their seemingly limitless stockpiles of individuals’ personal information. ChoicePoint was not rigorous enough in their precautions to completely eliminate the chance of an imposter getting into their system the way they did because each and every employee in the company was not trained or instructed on how to detect,
Colin Brown and Tarah Robinson
March 30, 2014
Table of Contents……………………………………………………………………………………………………..1
Cover Page 1
Research Paper 2-5
Work cited page 5-6
Having computer security, also known as logical security, is a good way to protect a person’s computer’s hardware, software, and data. There are various ways to protect a person’s computer. One of the most common ways is to not to share passwords to anyone. When doing passwords, it shouldn’t…
Hard Security Company will begin operations in January, 2009 and provide high security networked solutions to customers inside the United States and abroad, specifically targeting companies having more than 100 employees. The founders of the Hard Security Company are experienced Information Technology and Business professionals and passionate about the software solutions Hard Security Company will promote and offer.
An opportunity of Hard Security Company’s success exists because…
that your security measures have been compromised and that they have access to your information system. With the increasing dependence of computers to store sensitive data ranging from credit cards to correspondence, the need to protect the users of these computer sytems rises also.
In order to work on society to becoming better managed in protecting their interests, work needs to be done on not so much the hardware involved, but the peoples attitudes towards them. Even if a Computer was in the…
Economics of Computer Hacking*
Peter T. Leeson Department of Economics West Virginia University
Christopher J. Coyne Department of Economics Hampden-Sydney College
Abstract This paper considers various classes of computer hackers, with a special emphasis on fame-driven versus profit-driven hackers. We use simple economic analysis to examine how each of these hacking “markets” work. The resulting framework is employed to evaluate current U.S. policy aimed at reducing the threat of computer hacking…
information on my computer that I don’t want others to see. I would be afraid that if they can get into my wireless network then what else can they open. I would also feel like someone was invading my privacy almost like someone breaking into your house. Your computer is suppose to be a safe area for you to do your work surf the web and whatever else it is you like to do. I wouldn’t feel safe and I would want to get the person in trouble for stealing from me.
I had no idea about security before this…
videogame are over a billion dollars as it takes steps to repair its customers’ base and protect its customers. Nobuo Kurahashi, as Mizuho Investors Security analyst maintained that a complete and thorough assessment of potential impact on Sony’s future business would be more difficult to quantify (as cited in Osawa, 2011). The analyst argued that if data security concerns damage Sony’s brand image, this could undermine the…
Internet Security (CIS)
Background. The Center for Internet Security ("CIS") provides benchmarks, scoring tools, software, data, information, suggestions, ideas, and other services and materials from the CIS website or elsewhere (―Products‖) as a public service to Internet users worldwide. Recommendations contained in the Products (―Recommendations‖) result from a consensus-building process that involves many security experts…
international laws that relate to the practice of information security as well as come to understand the role of culture as it applies to ethics in information security.
When you complete this chapter, you will be able to:
Differentiate between law and ethics
Identify major national and international laws that relate to the practice of information security
Understand the role of culture as it applies to ethics in information security
Access current information on laws, regulations, and…