This website uses cookies to ensure you have the best experience. Learn more

Issc340 Final Paper

3359 words - 14 pages

For over the past several decades, information technology companies have been striving to figure out new and more effective ways to ensure that their computers and associative equipment, as well as, their clients’ devices are secure from unwanted intrusions. As computers and other electronic devices become more sophisticated and start storing more and more personal information, which includes, but is not limited to the development of technologies such as the fiber-optics, satellite communications, Bluetooth and the innovation of cloud storage, users are attempting to ensure their personal items are safe. However, while device users are trying to ensure their items are secure, there are the ...view middle of the document...

Most people use their computers to shop or enjoy entertainment and work. All that is necessary is one successful attack, and a person can gain almost any personal information they could want; banking information, addresses, phone numbers, possibly medical information and much more. With so much of their entire life at stake, why would anyone not attempt to protect their system at all costs? According to The Bureau of Justice Statistics, while conducting gathering of statistics from over 7,800 businesses in 2005, “Nearly 60% detected one or more types of cyber-attacks, the majority of victimized businesses (86%) detected multiple incidents, with half of these (43%) detecting 10 or more incidents during the year and approximately 68% of the victims of cyber theft sustained monetary loss of $10,000 or more.” These are some very significant numbers, when it comes to the value of damages and theft committed to these everyday businesses. These were not all major corporations, as you would assume internet thieves would target, but they were mostly small family owned and operated businesses with less to offer than larger corporations. The smaller businesses were the most infiltrated, due to lack of investment in the necessary protection from internet hackers and thieves.
The threat of a network incident does not simply come from an outside party. Threats can come from the ones that are meant to protect and work on the network for the certain company: its users. Now, not all of these threats are intentional, in fact, most of them are incidental. For example, a phishing attack is completely incidental and can cause great harm to a network. While a typical worker's work day can be passed online executing activities associated to their work, such as program research and work related courses, workers also spend a considerable amount of time surfing the internet, shopping, playing games, using YouTube or even gambling. An attacker could be utilizing a phishing attack to get banking information from an unsuspecting worker while that worker thinks that they are just simply operating on an official webpage. A phishing attack is when a criminal individual sends an” email disguises to be legitimate to an unwary email user, asking for them to visit their web page and verify items such as their username and password and other account information. These attacks can be very complicated, and even go as far as to have entire web pages dedicated to the scheme in an effort to gain as much information as possible from the victim. A study from October of 2012 shows just the threat that phishing attacks can pose: “The Fraud Report 2012 shows a large increase in phishing attacks, up 19% over the second half of 2011. The total loss for various organizations comes to $2.1 billion over the last 18 months. RSA estimates that there have been nearly 33,000 phishing attacks each month worldwide this year; countries such as Canada have registered an increase of 400 percent in the...

Other Papers Like Issc340 Final Paper

Holidays In Albania Essay

1636 words - 7 pages Have you ever thought about having exciting and incredibly cheap vacations? Albania might be the right choice. According to My Travel Guide, Albania is ranked the fourth among ten places worth visiting in Eastern Europe (“Top 10 Eastern European Destinations”). One can encounter three kinds of vacations in this Mediterranean country: winter, summer, and cultural. The ideal places to spend your winter vacations are the Albanian Alps. They are

A Heart Of Darkness Essay

1748 words - 7 pages In this short story, there are frequent significant subject and ideas that make the story, "A Heart of Darkness," by Joseph Conrad, and haunting novel. The main theme is absolute white power over the natives. The theme validates the corruption, and the dependence caused by the white people as they took over the Congo. White men were giving all the power; they had no self-control, and in the end they did not use wisely. The white men became

The Aspects Of Vulnerability Among The Exploited In Medical Research

2287 words - 10 pages Essentially, everyone is in some state of vulnerability. However, some of us are more susceptible to harm due to our vulnerabilities. The susceptible are the individuals with the greatest risk. These individuals risk the loss of their autonomy, and maybe even their lives. Vulnerable populations can be found in every subset of society. However, as previously mentioned, there are some vulnerable populations that are at an even greater risk than

The Hitchhiker’S Guide To The Galaxy

1171 words - 5 pages The Hitchhiker’s Guide to the Galaxy As the human race makes life-changing discoveries, it is made apparent that there is always more to learn as the universe, instead of becoming familiar, is becoming absurd. The Hitchhiker’s Guide to the Galaxy, written by Douglas Adams, as well as the 2005 film adaption, portrays absurdity to be an all-encompassing system in the universe. Through the introduction and attempt to understand lack of reason, the

The Ford Motor Company Wage Increase Of 1914 And The Theory Of Incentives And Efficiency Wages

1252 words - 6 pages doubling these wages can only be justified if, in some other way, it generates an equal or superior amount of value (either through a better product, lower costs, or both). According to the theory of incentives and efficiency wages, this is indeed the case, and Henry Ford even asserted that this decision was one of the best-cost cutting judgements they ever made (Raff and Summers 1987). This paper will outline the history of Ford Motor’s 1914

Historical Analysis Of The Economical Breakthroughs Of The Industrial Revolution

1396 words - 6 pages A Historical Analysis of the Economical Breakthroughs of the Industrial Revolution During the Industrial Revolution, many elements of society experienced huge breakthroughs that would change the way they functioned forever. Economics were definitely one of them. With many new inventions and many factories appearing, many, many, more resources were being created than ever before. Also, all of the revenue from these resources was being given to

Leadership Portrayed in Monologue from Shakespeare’s Henry V

1214 words - 5 pages Leadership is defined as a socially constructed process and which also affect organizational future outcomes. Leader is someone at high position who have overall duty for an organization, she or he decide what to do and the way how to achieve it. (Carter and Greer, 2013)The role of leader is extremely important for an organization, leader use their own power to influence the followers though many different ways such as motivation in order to

Cuba Civil Rights

1906 words - 8 pages of this, the black market is the main way people get money, according to Corrales. The only people to receive these limited rights include members of the government and military. The final form of abuse the government uses to steal from the people through the courts. “World Report 2013 Cuba” says the police departments in Cuba harasses, assaults, and imprison human rights defenders who attempt to document the abuses. Moreover, if you take money

US Freight System

1273 words - 6 pages General Environment Each American requires the movement of approximately 40 tons of freight per year across the freight network. This includes everything from shirts to lawn mower to orange juice. • As the U.S. population expands, the U.S. freight system will be called upon to meet the demands of a larger population • Between 2010 and 2035, the system will experience a 22 percent increase in the total amount of tonnage it moves • By 2050, with

Democratic Peace Theory

1852 words - 8 pages Intro: US Presidents have made it a goal during their term(s) in office to establish a good relationship with foreign countries and even try to improve upon existing connections with our allies. Some believe it is to prevent conflicts between the countries while others dispute that it is a threat assessment by the United States to pick and choose their friends and enemies. Preventing conflict between two democracies or countries that practice

Booker T. Washington

1621 words - 7 pages “Success is to be measured not so much by the position that one has reached in life as by the obstacles which he has overcome” –Booker T. Washing. Booker Taliaferro Washington was born in Hale’s Ford, Virginia on April 5th, 1856 to Jane Burroughs and an unknown White man. Washington was married three times. His first wife was Fannie N. Smith from Malden, West Virginia. Booker and Fannie were married in the summer of 1882 and had one child

Related Essays

Evolution Of Wi Fi Essay

3432 words - 14 pages The Evolution of Wi-Fi Charles Williams Albert Acuna ISSC340 American Military University Abstract From the creation of the IEEE standard in 1997 to current times Wi-Fi has evolved dramatically over the years. An idea to provide connectivity to devices with the absence of cables was adopted globally. Each year brings about new ways of utilizing wireless technology. This study aims to cover Wi-Fi from inception to present day and

Freedom And Responsibility Essay

2141 words - 9 pages states. For the most part, the protester have their head down as the pepper spray was being sprayed, but eleven students were hit directly in the face with the spray. Two protesters were taken to the hospital and the others were treated on scene. After the pepper spray event, ten people were arrested. (Outcry After Police, 2011) The final precept is “Congress shall make no law abridging to petition the Government for a redress of grievances.” So

Hate Crime Laws Essay

2348 words - 10 pages On June 7, 1998, 49-year-old James Byrd Jr. of Texas accepted a ride from three white men, who then beat him severely, urinated on him, chained him by his ankles to the back of their pick-up truck, dragged him for three miles into the countryside, and dumped his corpse in front of an African-American cemetery (Graczyk). A little over a year later, a jury sentenced ring leader John King to death by lethal injection (“Man Executed for Dragging

Rational Emotional Behavior Therapy Case Study Conceptualization And Treatment Plan

2140 words - 9 pages Rational Emotional Behavior Therapy Case Study of Sarah: A Conceptualization and Treatment Plan Rational emotive behavior therapy, REBT, was developed by Albert Ellis and holds the central belief that the events in our lives do not cause our disturbances but that they are instead caused by our view of the events (Murdock, 2009). Murdock (2009) states that “people are seen as responsible for their behavior” (p. 279) but, because they are