This website uses cookies to ensure you have the best experience. Learn more

Challenges And Security Issues Essay

1245 words - 5 pages

Unit 5 IP – Challenges and Security Issues
American InterContinental University

In this assignment, review of three different case studies will be discussed. Topics will include when an antivirus software cripples your computer, determining how secure cloud computing is, and electronic medical records systems. After the review of each case study, a set of questions will be answered to provide details on each study as to what was reviewed.

Challenges and Security Issues (Case Studies)
In this assignment, review of three different case studies will be discussed. Topics will include when an antivirus software cripples your computer, determining how secure cloud ...view middle of the document...

The resolution download “SuperDAT Remediation Tool” had to be downloaded from an uninfected computer, and then transferred to a flash drive in order to fix each computer, due to the fact that the networks were stripped from the computer. McAfee customers trust that their service updates are to help protect their machines, not harm them, as done in this situation.
If I were a customer of McAfee, I would definitely say that I feel as though their response should have been a lot sooner. They should have released some type of statement when they were aware of this situation, so that its customers would have known and have been made aware that they were working on the problem.
For McAfee, in the event that something like this happens again in the future, they should take into consideration the preventative measures. Their quality assurance processes need to be better reviewed (Laudon & Laudon,2012, p. 304).
Case Study #2 How Secure is the Cloud
Cloud computing is becoming more and more popular among larger companies due to the cost saving measures that it offers. The security and control problems that come into play in this case are that there are many risks. There is high distributing involved in this case when it comes to cloud computing. A company’s data resides in a virtual library in various data centers and service farms. When this data is distributed to other data centers around the world, in which you may never know where this data is. That seems to be a huge risk alone. It is also very hard to track whether or not unauthorized activity is being conducted, therefore ensuring that data is encrypted if stored on a device. Loss of data is a huge concern as well.
When it comes to the security and control of cloud computing, all parties can contribute to problem. Employees having unauthorized access controls, the infrastructure on both the provider and customer side are both very vulnerable.
Knowing how secure cloud security is, is a question that that truly depends on the provider. It is very hard to prove whether or not the data is actually secure. A public company seems to offer more security because, by law, it has to disclose how your information is being managed. Another option is given is to chose a company that allows you to chose where the cloud computing will be performed/ran. Though these are options, security can still be an issue.
Issues that would need clarification by perspective vendors would be who would have access to the data that is being transmitted. Trust would be given to a cloud computing vendor if they could ensure that our corporate systems would be secured and encrypted. The provider should not have any compliance issues. (Laudon & Laudon,2012, p. 321).
Case Study #3 Are Electronic Medical Records a Cure for Health Care?

Other Papers Like Challenges and Security Issues

Video Conferencing And Security Issues Essay

1385 words - 6 pages . Unfortunately every kind of messaging technology is or will be subject to security exploits by those who wish to gain access to private information. Even though it is costlier to have face to face meetings when those meeting must fly across the country it is often safer because conferences can take place behind closed doors and the participants can be fairly certain of who is receiving the information. "Security professionals know that contrary

Cyber Security And Its Challenges To Society

3707 words - 15 pages ISSUES ON CYBER SECURITY TRENDS 14 Mobile Devices and Apps 14 Social Media Networking 14 Cloud Computing 14 Protect systems rather Information 15 New Platforms and Devices 15 Everything Physical can be Digital 15 Survey Questions 16 Conclusion 16 Cyber Security and its Challenges to Society Introduction: Over the past several years, experts and policy makers have expressed increasing concerns about protecting internet from cyber-attacks

Security, Confidentiality And International Issues In Real Estate

2733 words - 11 pages database. When dealing with real estate there are also legal and regulatory issues to deal with when dealing with the public in person and over the internet. This paper is going to look at security, confidentiality and international issues with real estate in the e-business atmosphere.LegalAny real estate company is aware of the seriousness of this industry, since it deals with many laws that effect people greatly in their personal lives. Law

Security Issues and Solutions in E-Commerce Applications

2185 words - 9 pages Security Issues and Solutions in Ecommerce Applications The rise in popularity of conducting business online via ecommerce sites has not gone unnoticed by hackers and other cyber-criminals. A rise in the number of transactions and an increase in businesses that have an online presence have provided hackers with increased opportunities to exploit security vulnerabilities in ecommerce applications for personal profit, at the expense of

Human Security

1956 words - 8 pages AN ESSSY ON THE POSSIBILITIES AND LIMITATIONS PRESENTED BY THE NEW LIBERAL APPROACH OF HUMAN SECURITY By ANON INTRODUCTION 1. ‘Human Security’ is an emerging paradigm which is used to understand contemporary security issues that affect the individual rather than the state. The notion of ‘National Security’ where the perceived threat came from another state intending to attack other states borders is being re-viewed. “Ideally

Global Security Policy - Week 5 - Cmgt-400

969 words - 4 pages Global Security Policy CMGT-400 Monday, May 11, 2015 Vijay Bhaskar Jonnalagadda Global Security Policy Organizations with offices in multiple countries have to strategically implement personnel, logistics, network configurations, and inventory; but they also have to create a security plan to secure these assets to keep their customer, brand integrity, and profits. Some of the issues faced while maintaining security for a company in

The Transnational Security Threats from Failed States

1334 words - 6 pages activities, and terrorist groups have established strong bases in such countries. The challenges posed by these failed states on security issues are far-reaching, and reliable measures have to be taken in order to safeguard the safety of the global population. Many forms of transnational security threats have emerged, and international peace has persistently been compromised by this trend. Solomon Islands, Somalia, Afghanistan and Sudan are good examples

Critical Report

1809 words - 8 pages reinventing itself as a model of Asian regionalism. ASEAN has seen progress in terms of its economic trading block, but continues to face challenges in terms of reaching a consensus on political and security issues. As the organization operates on the basis of a consensus mechanism and non-intervention policy there is no enforcement mechanism for implementing its policies. ASEAN’s credibility is at stake on the ThaiCambodian border question and

My Views About Science and Technology

1250 words - 5 pages to understand the complex problems at the intersection of scientific and technical issues and international affairs. The major combines work in the natural sciences with international affairs courses dealing with the environment, energy, business and economic development, information technology and communications, health and security—many of which are specially designed for the STIA program. Goals of the Major Science, Technology and

Bfsi Security Market: Global Industry Analysis and Forecast 2016 - 2024

1259 words - 6 pages covers exhaustive analysis on: • BFSI Security Market Segments • BFSI Security Market Dynamics • Historical Actual Market Size, 2013 - 2015 • BFSI Security Market Size & Forecast 2016 to 2024 • BFSI Security Current Trends/Issues/Challenges • Competition & Companies involved • BFSI Security Market Drivers and Restraints Regional analysis includes • North America • Latin America • Europe • Asia Pacific • Middle East & Africa

Top 10 Laws of Security

1706 words - 7 pages have their role in analyzing, architecting, implementing, testing, maintaining and managing security according to published policies and standards, where others should follow security policies and standards, and using available security controls, in addition to handling information assets with the expected level of awareness. 10 Ninth Law: Security is not just technical issues Reference to the first law and eighth law, security is not a just

Related Essays

Csr Issues And Challenges Essay

2181 words - 9 pages Corporate Social Responsibility – Issues and Challenges with reference to Bhopal city. Ms Charu Modi Ms Ankita Rajdev Ms Meenal Pathak Assistant Professor Assistant Professor Assistant Professor JSSGIW – FOM JSSGIW – FOM JSSGIW – FOM 08871312197 09893299224 09989773177 Abstract Corporate Social Responsibility is the term used to define organisation’s commitment to the society and the environment

Alm Issues And Challenges Essay

4846 words - 20 pages ASCI JOURNAL OF MANAGEMENT 29(1). 39-48 Copyright ? 1999 - Administrative Staff College of India. R. VAIDYANATHAN Asset-liability management: Issues and trends in Indian context This paper discusses issues in asset-liability management and elaborates on various categories of risk that require to be managed. It examines strategies for asset-liability management from the asset side as well as the liability side, particularly in the Indian

Networking And Security Issues Essay

5170 words - 21 pages IT for Decision Makers NETWORKING AND SECURITY ISSUES Handout 1 Overview Introduction Many organizations have invested vast amount of money in computer networks, only to find out that although it is providing means of improving the efficiency and productivity of the organization but it also exposes the Organization to possible attacks and threats. Such attacks have been the most challenging issue for most network administrators and

Handling Security And Ethical Issues Essay

1677 words - 7 pages Handling Security and Ethical Issues at TBWI Course: IT560-01 Handling Security and Ethical Issues at TBWI A growing concern, especially with the recent information leak at Target, is the issue of security. Outlined are security concerns for TBWI and how best to handle them. In addition to handling security issues, there may be complicated ethical issues that may occur. To best handle these situations, those