This website uses cookies to ensure you have the best experience. Learn more

Security Policies Essay

1425 words - 6 pages

Bowie State University
Department of Management Information Systems
INSS 887: Emerging Issues in Information Security
Assignment #3
Summer Session, 2014

Instructions:
Answer each question thoroughly. Points will be deducted for fragmentary answers. The completed assignment should be submitted in the designated Drop Box by midnight on Sunday, July 27, 2014.

1. ABC Corporation has a thorough security plan for the primary and recovery systems used to ensure that even during a recovery the information is protected. Comprehensive plans are only a part of its efforts in securing recovery. Assuming that ABC will use contract employees for part of the recovery, describe how the ...view middle of the document...

Because of this, it’s logical for organizations and governments to increase efforts to protect computer networks and safeguard data. It would be immoral to provide insufficient security for sensitive data such as financial information or health records. Businesses and governments should be held responsible for protecting data. Unawareness or a lack of means should no longer be a justification for a lack of cyber protection.

In contrast, while Britain’s Joint Cyber Reserve Unit has the means to counter-attack in cyber-space, they also have the ability to strike in cyber space. Back and forth attacks have the potential to turn dreadful, with the consequences resulting in actual combat. At the very least, counter cyber-attacks should be limited to governments. This is not to say that I agree with counter cyber-attacks. Former hacker Mustafa al-Bassam, who once belonged to the LulzSec hacktivist group, stated that Britain’s possible recruitment of convicted hacktivists for the Joint Cyber Reserve Unit may backfire. Al-Bassam noted that hacktivists often target governments because they “stomp” on the civil liberties of others. The recent revelations from Edward Snowden about US and UK government spying programs supports this mistrust and has swayed a lot of people with cyber skills from working for government cyber programs. The public has a genuine fear that government cyber programs will misuse their power and go outside their jurisdiction of securing its nation.

b. How should the U.S. government respond to a hacking attack by China in which the hackers shut down critical military communications for several hours?
Any attack that aims for military communications must be taken seriously, regardless of who launched the attack. The 2009 Stuxnet attack that was directed towards Iran’s nuclear program could have been considered “an act of force” and was possibly unlawful under international law, according to the manual commissioned by NATO’s cyber defense center. If US military communications were attacked by China, the US should turn to NATO and the United Nations before launching a counter-attack against China. Efforts should be circumvented to engage in physical combat. Maybe business sanctions could be enacted against Chinese-US transactions but this would hurt both American and Chinese businesses.
3. Power and water providers might soon have smart metering and analysis systems sophisticated enough to deduce what appliances we are using at various times of day (e.g., cell phones charging and an air conditioner running), when we shower (and for how long), and when we sleep.
c. Identify the privacy or other issues this innovation could raise.
Opponents of smart meters claim they may cause health, security, and privacy invasions on consumers. Smart meters have the ability to regulate thermostats in homes and businesses. For example, thermostats could be changed during peak times. This capability could be inconvenient...

Other Papers Like Security Policies

It456 Db2 Essay

744 words - 3 pages vulnerabilities are more easily. Attacks are carried out on these compromised infrastructures including industrial espionage, revenge, financial gain, and terrorism. ISSA.com/security Some of the principles used in the design of a secure Infrastructure are compartmentalization of information, principle of least privilege, weakest link, defense in depth, authentication password security, antivirus, packet filtering,, firewalls, policies both

Salim Lims Essay

667 words - 3 pages efficient and money-saving program the SPP was to improve the airport security. IV. Development of Alternative Action The government can keep the privately contracted airport security system. The contractors can implement their own made additional safety features on the top of the minimum required safety policies, TSA made, and can have more flexibility of hourly wage, employee benefits, the risk management techniques, and destroy the wall of

Security Management Case Study #1

819 words - 4 pages SMT 320 Case Study #1 Kristian Lauren R. Martin November 6, 2011 Case Study #1 Building the Foundation – Security Assessments As the security manager of a major corporation tasked with creating the initial security assessment and auditing program for the company, the first step in developing proposals for the security services would be conducting a comprehensive survey (policies, procedures and operations) of the entire facility to

Cap Study Guide

5295 words - 22 pages sectors have policies, procedures, standards and guidelines that must be followed – the Payment Card Industry (PCI) Data Security Standard required by Visa and Master Card is such an example. Other examples of administrative controls include the corporate security policy, password policy, hiring policies, and disciplinary policies. Administrative controls form the basis for the selection and implementation of logical and physical controls

Public Policing Vs Private Security

1153 words - 5 pages the community safe. Another similarity of public policing and private security is that both needs to have some type of training, private security may not need as much training as public policing but both need training to perform their duties effectively. The different roles that public policing and private security play in the criminal justice system are that public policing are bound by enforcing the laws and policies. Private securities

International Security

876 words - 4 pages -governmental organisations (NGOs) importance. The insecurity of the nation state has great impact on the US foreign and security policies. There are various ways in which this is affecting the US foreign and security policies; through the introduction of the globalisation system the US policies will be undermined and thus negatively impacting on its security. The United States will also lose its control in the international economy a factor which will

Security Policy

2866 words - 12 pages , the importance of establishing good security policies cannot be overstated. This does not only serve to enhance a company’s daily business procedures and transactions, but also to ensure that the much needed security measures are implemented with an acceptable level of security. A security Policy is basically a plan outlining a company’s critical assets are and how they must (and can be) protected. Its main purpose is to provide staff with a brief

China Outdoor Security Lighting Industry 2016 Market Research Report

529 words - 3 pages professional and in-depth study on the current state of the Outdoor Security Lighting industry. The report provides a basic overview of the industry including definitions, classifications, applications and industry chain structure. The Outdoor Security Lighting market analysis is provided for the China markets including development trends, competitive landscape analysis, and key regions development status. Development policies and plans are

China Outdoor Security Lighting Industry 2016 Market Research Report

529 words - 3 pages professional and in-depth study on the current state of the Outdoor Security Lighting industry. The report provides a basic overview of the industry including definitions, classifications, applications and industry chain structure. The Outdoor Security Lighting market analysis is provided for the China markets including development trends, competitive landscape analysis, and key regions development status. Development policies and plans are

Let1

333 words - 2 pages , each address some of these key issues from separate fronts. The three policies include a Remote Access Policy, Application Deployment, and a Routine Maintenance policy. The Remote Access policy aims to correct the issue that non-authorized users were able to access the EHR system. HIPAA has included provision in the Security Rule that allows for remote access, but with certain limitations. I have included provision that restricts remote access based

Security Awareness Training

622 words - 3 pages PFCH security policies deters or makes it difficult for possible data hackers to acquire hospital confidential information (Gregory, 2010). The best ways and cost effective method to institute the program is by means of classroom training sessions, posters, useful tips through emails and possible websites that provide security awareness. Utilizing these methods provides the staff a comprehensive awareness of the hospital procedures, security

Related Essays

Security Policies Essay

4575 words - 19 pages IT Security and Compliance Policy | IS3350/Security Issues; Roger Neveau; 3/12/2013; Mike Taylor, Instructor | This document is the Final Project for IS3350 Security Issues, creating and improving security policies for LenderLive Network | | Table of Contents Introduction2 Risk Analysis2 SWOT Analysis2 Physical Security5 Data Classification6 Regulatory Compliance8 Intellectual Property

Cmgt400 Week 4 Individual Essay

1359 words - 6 pages maintain confidentiality. The importance of policies and standards for maintaining information systems security The security goals and policies of an organization are best implemented by the organization’s management through their ability to create an effective work environment for the employees. Information security policies are often the most difficult to implement yet they are the least expensive means of control. Whitman (2011

Top 10 Laws Of Security Essay

1706 words - 7 pages Security Policies, Standards, Guidelines and Procedures, in addition to applying suitable and effective level of awareness to deal with information assets in a healthy way. 3 Second Law: Security is must-to-have, not better-to-have decision In the past, security was not matured to be essential since the number of technology specialists was low, and easy to be known. Therefore, most applications were using minimal security measures, and

Security Breach Essay

1832 words - 8 pages increased by the management among the employees to support successful implementation of the security policies and strategies at the workplace. To support the security policies at the workplace, the Sony Security Module is also developed by the firm that helps the firm to allow high security system at the workplace to save the collected data related to the customers for personal use (Burdon, Reid & Low, 2010). Under the security policies