Preventing Security Breaches: Collaborative Summary
March 22, 2015
Preventing security breaches is not as easy as people would think due to the fact that it is so much easier to share information. There are many potential threats that occur with computers and technology as a whole. In order to prevent certain breaches in security you must first recognize and understand the different types of threats. In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge or enjoyment. There are master minded hacker criminals in the technology world that are able to breach any kind of security and take over your computer. Computer systems can be affected by ...view middle of the document...
There are many steps you can take to prevent breaches such as securing your browser and testing your security configuration for weakness. You can stop transmission of data that is not encrypted and make sure to encrypt all data. Encryption is the conversion of data into a form (cipher text) that only the person responsible for creating it and affiliated parties have the keys needed to decrypt and understand it. Many companies are incorporating automatic encryption into applications. Networks establish firewalls that encrypt information when data is going to unsecured sites. Although security breaches may happen, keeping the information encrypted will protect many companies from losing valuable information to dishonest crooks. Establishing a preventative breach plan will prevent operational breakdown when a system breach happens because the faster you react the less time the virus will have to affect your system. There should be a security policy put in place and adhered to at all times. Security policies should not only cover the physical side of a company, but also the electronic mediums in which their information is kept. A portion of the security policy should include recovery and response systems - what to do if a security breach happens, and how they will recovery from the breach. The backup plan will include how often and where to keep copies/backups of the systems and internal data as well as any redeployment plans required to get the company repaired and back up and running. Educating employees and managers is a must regarding handling and protecting data. Employee training is a critical portion of the security policy. Better informed and aware employees can help keep a company safe from external attack, but also as a first warning system if an attack were to happen.