Security Week 4 Case Study

In: Computers and Technology

Submitted By dj2tall
Words 796
Pages 4
Security Threats And Attacks
Week 4 Case Study
Dustin Soria
Security Threats And Attacks
Week 4 Case Study
Dustin Soria
2014
2014

Recent statistics show that a large percentage of people have the idea that computer security is an issue that only affects organizations. Many people believe that, at a personal level, there is little that one can have to do with their information especially because they don’t see if someone will need their information. In contrast, there is a lot of useful information that a third party may obtain from a personal computer that the user may not even realize. For instance, a user may have sensitive information that would lead to his or her private life, secrets, or even important financial information. Such information can be used by attackers to monitor their internet activities, whether they are logged into their own personal computer on a local network, or even the internet. The victim’s sensitive information can be sold over the internet, or even to third parties such as advertisers and criminals among others. As such, it is important that serious security measures are taken to protect one’s personal computer from such security issues. There are numerous security threats that can be on a personal computer. One of the most common threats is a Virus. A Virus is a piece of software that can replicate itself and infect a computer without the permission or knowledge of the user. A Virus can only spread when it is transmitted by a user over a network or the Internet, and removable media such as flash drives and CD’s. (The 11 most common computer security threats) Viruses themselves are usually undetectable and attach themselves to a program or an email. With damage ranging anywhere from minimal to destructive. The best way to protect yourself here is to have an up to date antivirus installed on your computer and scan your…...

Similar Documents

Week 4 Case Study

...Week 4 Case Studies DeVry University Legal and Ethical Issues Case Study 10.1 Question - What does loyalty to the company mean, and how important is it, morally? Under what circumstances, if any, do employees owe loyalty to their employers? When, if ever, do they owe loyalty to their coworkers? Answer - Loyalty to the company implies being loyal to the company that you work for. A loyal employee does not steal from the company, they work hard, and they do not actively seek other employment opportunities. Loyalty is extremely important. A loyal staff is usually unified, and they usually share the same goals when doing and completing tasks. Employees do owe their employers some loyalty. The employer puts food on their tables, and clothes on their families back. It works both ways. The employer should be loyal to the employees as well. The only time employees really do not owe their employers loyalty is if they promote an unsafe or hostile work environment. Loyalty to co-workers is important as well. Especially when working in groups. If a fellow employee helps you, or goes out of their way to help you, it is natural to think you owe them some loyalty. What goes around comes around, and loyal people usually have a lot of good coming their way. Case Study 10.2 Question - Do you think Storms and Ahearn qualify as whistle-blowers? What do you think their motives were? Answer - I do not think Storms or Ahearn qualified as whistleblowers. Storms simply pointed......

Words: 460 - Pages: 2

Case Study 3: Security

...Case Study 3: Security 1. Analyze the new system and determine the design issues with this new system. With any type of fast-food restaurant grease and other types of oils are used in the process to create the food that is delivered to the customers. Since these oils are being used to create the food the employees need to touch the food and most times to either cook it or deliver the food to the customers. The unfortunate handling of this food causes the employees to get grease on their hands and fingers. This can be an issue with the design because after time the grease built up will cause the screen to become unresponsive or unreadable as well. Another design issue that the new system has is a two part security issue. First is a lack of security giving the ability for employees to login into the register interface for other employees that have forgotten their user id and passwords. This is huge concern for the management because each employee is responsible and accountable for their time on the register and money that goes into the register as well. If other employees are logging into the system for them, and the register comes out short at the end of the night, there is no body to hold accountable for the missing money. This huge security risk for management, all employees should be held accountable for their time on the register and not be logging into the system for other employees. The other security concern that is a design issue with the new system...

Words: 1983 - Pages: 8

Bus5450 Week 4 Case Study

...Brief summary of the case study The modern business environment is dynamic and competitive. My supervisor often says “we create our own futures,” meaning employee performance ensures retention or the opportunity to move to a new company. This week’s case study discusses the importance of force ranking and performance assessment. Each year my company conducts individual performance assessments which add more anxiety during the holiday season. Many companies like GE, Microsoft and American Airlines have adopted this strategy but now they are becoming more flexible because they are being highly criticized because of their way of evaluating employees (Irvine, 2012). Companies are now implementing innovative techniques to evaluate their employees, so that better retention can be achieved. Opinion regarding forced ranking performance appraisal I think this topic is similar to most emotionally charged issues, you can find studies and articles which support both the advantages and disadvantages of forced ranking. Usually when I analysis a complex, emotional topics, I tend to land somewhere in the middle. When I was serving within the military as a commissioned officer we used a forced ranking system to identify officers for promotion and retention and for increased responsibility and potential based on their individual performance. No system for evaluating people is flawless but I did see some benefits to forced ranking, although in the end I feel these benefits are......

Words: 972 - Pages: 4

Mgmt Case Study Week 4

...new approach on the system. He says that the software systems today are not implemented in-house and these systems must be developed and purchased from outside, as these systems today behave as commodity in the market. So, instead of working with the in-house development of software he put out a market proposal and invited different vendors to provide a proposal and quotation for the new system they are thinking to implement in their education system. There were several companies approached for this course of action. After contacting three different schools already using one of these company’s systems, JSCC selected three vendors. They approached schools and get their reviews and studied the system over there and after doing several weeks of study, they chose to go with DSI, as it’s been ranked first in such systems and providing many other facilities with the software support system. DSI agreed on the system and decided to make the proper changes and started working on the system. They also laid down the approach to provide the training to different officers present in the school to let them work on the system. After doing the modifications and changes, DSI was given the date in the summer (when school is off) to start with the integration of their new system. They started running the schedules to transfer data from the old system but things are not going into right direction and schedules were getting rocky. DSI explained that the officer is responsible for this and......

Words: 1049 - Pages: 5

Cis 524 Week 4 Case Study 2

...A++PAPER;http://www.homeworkproviders.com/shop/cis-524-week-4-case-study-2/ CIS 524 WEEK 4 CASE STUDY 2 CIS 524 Week 4 Case Study 2, CIS 524 Week 4 Case Study 2 Case Study 2: Design Process Due Week 4 and worth 90 points You have recently started your own software design company. You discover that your local DMV is looking to build a system that will allow receptionists to check customers in quickly. They would like for the system to allow customers to self-check-in during busy times, but have receptionists check customers in the rest of the time. Your company puts a bid in for the project and wins. Read the article located at http://www.bcs.org/upload/pdf/ewic_hc07_lppaper18.pdf. Write a four to five (4-5) page paper in which you: 1. Suggest the prototyping technique you would use for this system and support your rationale. 2. Create a management plan containing eight to ten (8-10) stages for proper design of such a system. 3. Explain each stage of the management plan and justify your rationale. 4. Estimate the length of time it will take to complete each stage of the management plan. 5. Compare and contrast the self-check-in interface with the interface a receptionist would use. 6. Use Microsoft Visio or an open source alternative, Dia, to create a total of two (2) graphical representations of your proposed interfaces, one (1) for the self-check-in and one (1) for the receptionist. Note: The graphically depicted solution is not......

Words: 466 - Pages: 2

Cis 331 Week 4 Case Study Assignment

...CIS 331 Week 4 Case Study Assignment http://hwguiders.com/downloads/cis-331-week-4-case-study-assignment CIS 331 Week 4 Case Study Assignment There are many possibilities you can take when dealing with an SS. A SRS is basically an organization understands of the customer or potential client’s system requirements and dependencies at a particular point in time prior to any actual design or even change development work. This is known as a two-way insurance policy that makes sure that both the client and the organization understand the other’s requirements from a certain perspective at a given point in time. In this essay I will create a SRS of a hotel managements system. I will also give you examples of an SRS and explain things such as the description, the function, and the specifications. User & System Requirements With this system come user requirements. These are certain requirements that will help gain access to the SRS for the hotel. It will also be broken down into specific categories. For example; the software that will most likely be used is the oracle. While some of the user requirements will be login credentials, reservations, check ins, payments and room service. The external requirements will include things such as a computer or laptop, keyboard, mouse, and a printer. As for the hardware requirements, this system will most likely be running on windows by Microsoft. Functional and Nonfunctional Requirements Most of the functional requirements...

Words: 267 - Pages: 2

Htm520 Week 4 Case Study 2 Htm 520 Week 4 Case Study 2

...HTM 520 HTM520 Complete Course(Select your Due week) Click below link for Answer or visit www.workbank247.com Download Answer here http://workbank247.com/q/htm-520-complete-course-select-your-due-week/2452 http://workbank247.com/q/htm-520-complete-course-select-your-due-week/2452 HTM520 Week 1 Discussion  "The Strategic Management Process” Please responds to the following: From the e-Activity, examine the four (4) main elements of the strategic management process, and determine the primary manner in which they correlate with one another. Provide two (2) examples that depict the importance of strategic alignment within the strategic management process. Determine which of the four (4) main elements of the strategic management process that you believe to be the most important in the hospitality industry. Provide one (1) example that depicts the importance of the selected element to support your position. HTM520 Week 2 Discussion "Assessment of the Broad Environment” Please respond to the following: Analyze the four (4) main elements within the micro environment. Develop one (1) strategy that shows the importance of each element and why it is necessary to adopt the changes in order to remain compliant with the law and competitive as an industry leader. Analyze the five (5) forces of competition in Porter’s Five Forces model. Suggest two (2) specific approaches that a hospitality company could take in order to examine its competition. Provide a rationale for your response in......

Words: 2792 - Pages: 12

Htm520 Week 8 Case Study 4 Htm 520 Week 8 Case Study 4

...HTM 520 HTM520 Complete Course(Select your Due week) Click below link for Answer or visit www.workbank247.com Download Answer here http://workbank247.com/q/htm-520-complete-course-select-your-due-week/2452 http://workbank247.com/q/htm-520-complete-course-select-your-due-week/2452 HTM520 Week 1 Discussion  "The Strategic Management Process” Please responds to the following: From the e-Activity, examine the four (4) main elements of the strategic management process, and determine the primary manner in which they correlate with one another. Provide two (2) examples that depict the importance of strategic alignment within the strategic management process. Determine which of the four (4) main elements of the strategic management process that you believe to be the most important in the hospitality industry. Provide one (1) example that depicts the importance of the selected element to support your position. HTM520 Week 2 Discussion "Assessment of the Broad Environment” Please respond to the following: Analyze the four (4) main elements within the micro environment. Develop one (1) strategy that shows the importance of each element and why it is necessary to adopt the changes in order to remain compliant with the law and competitive as an industry leader. Analyze the five (5) forces of competition in Porter’s Five Forces model. Suggest two (2) specific approaches that a hospitality company could take in order to examine its competition. Provide a rationale for your response in......

Words: 2792 - Pages: 12

Cis 500 Week 6 Case Study 1 Cyber Security

...CIS 500 WEEK 6 CASE STUDY 1 CYBER SECURITY To purchase this visit here: http://www.activitymode.com/product/cis-500-week-6-case-study-1-cyber-security/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 500 WEEK 6 CASE STUDY 1 CYBER SECURITY CIS 500 Week 6 Case Study 1 - Cyber Security in Business Organizations - Strayer University 2015 Version NEW Write a four to six (4-6) page paper in which you: 1. Determine the fundamental challenges that organizations face in general in regard to protecting organizational assets and information. 2. Specify the red flag(s) that Target overlooked or ignored before the retail attack and give your opinion as to why Target overlooked or ignored the red flag(s). 3. Determine the main actions that Target took after the breach occurred and evaluate the efficiency of such actions. More Details hidden... Activity mode aims to provide quality study notes and tutorials to the students of CIS 500 Week 6 Case Study 1 Cyber Security in order to ace their studies. CIS 500 WEEK 6 CASE STUDY 1 CYBER SECURITY To purchase this visit here: http://www.activitymode.com/product/cis-500-week-6-case-study-1-cyber-security/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 500 WEEK 6 CASE STUDY 1 CYBER SECURITY CIS 500 Week 6 Case Study 1 - Cyber Security in Business Organizations - Strayer University 2015 Version NEW Write a four to six (4-6) page paper in which you: 1. Determine the fundamental challenges that organizations face in......

Words: 685 - Pages: 3

Sec 280 Week 4 Case Study Computer Security

...SEC 280 WEEK 4 CASE STUDY COMPUTER SECURITY To purchase this visit following link: http://www.activitymode.com/product/sec-280-week-4-case-study-computer-security/ Contact us at: SUPPORT@ACTIVITYMODE.COM SEC 280 WEEK 4 CASE STUDY COMPUTER SECURITY SEC 280 Week 4 Case Study Computer Security Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system Activity mode aims to provide quality study notes and tutorials to the students of SEC 280 Week 4 Case Study Computer Security in order to ace their studies. SEC 280 WEEK 4 CASE STUDY COMPUTER SECURITY To purchase this visit following link: http://www.activitymode.com/product/sec-280-week-4-case-study-computer-security/ Contact us at: SUPPORT@ACTIVITYMODE.COM SEC 280 WEEK 4 CASE STUDY COMPUTER SECURITY SEC 280 Week 4 Case Study Computer Security Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system Activity mode aims to provide quality study notes and tutorials to the students of......

Words: 904 - Pages: 4

Sec 280 Week 6 Case Study Computer Systems Security

...SEC 280 WEEK 6 CASE STUDY COMPUTER SYSTEMS SECURITY To purchase this visit following link: http://www.activitymode.com/product/sec-280-week-6-case-study-computer-systems-security/ Contact us at: SUPPORT@ACTIVITYMODE.COM SEC 280 WEEK 6 CASE STUDY COMPUTER SYSTEMS SECURITY SEC 280 Week 6 Case Study Computer Systems Security Gem Infosys, a small software company, has decided to better secure its computer systems after a malware attack shut down its network operations for 2 full days. The organization uses a firewall, three file servers, two Web servers, one Windows 2008 Active Directory server for user access and authentication, ten PCs, and a broadband connection to the Internet. The management at Gem needs you to formulate an incident-response policy to reduce network down time if future incidents occur. Develop an incident-response policy that covers the development of an incident-response team, disaster-recovery processes, and business-continuity planning Activity mode aims to provide quality study notes and tutorials to the students of SEC 280 Week 6 Case Study Computer Systems Security in order to ace their studies. SEC 280 WEEK 6 CASE STUDY COMPUTER SYSTEMS SECURITY To purchase this visit following link: http://www.activitymode.com/product/sec-280-week-6-case-study-computer-systems-security/ Contact us at: SUPPORT@ACTIVITYMODE.COM SEC 280 WEEK 6 CASE STUDY COMPUTER SYSTEMS SECURITY SEC 280 Week 6 Case Study Computer Systems Security Gem Infosys, a......

Words: 1093 - Pages: 5

Sec 280 Week 4 Case Study Computer Security

...280 Week 4 Case Study Computer Security Purchase here http://devrycourse.com/sec-280-week-4-case-study-computer-security Product Description Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system. SEC 280 Week 4 Case Study Computer Security Purchase here http://devrycourse.com/sec-280-week-4-case-study-computer-security Product Description Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system. SEC 280 Week 4 Case Study Computer Security Purchase here http://devrycourse.com/sec-280-week-4-case-study-computer-security Product Description Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system. SEC 280 Week 4 Case Study Computer......

Words: 1201 - Pages: 5

Sec 280 Week 6 Case Study Computer Systems Security

...SEC 280 Week 6 Case Study Computer Systems Security Purchase here http://devrycourse.com/sec-280-week-6-case-study-computer-systems-security Product Description Gem Infosys, a small software company, has decided to better secure its computer systems after a malware attack shut down its network operations for 2 full days. The organization uses a firewall, three file servers, two Web servers, one Windows 2008 Active Directory server for user access and authentication, ten PCs, and a broadband connection to the Internet. The management at Gem needs you to formulate an incident-response policy to reduce network down time if future incidents occur. Develop an incident-response policy that covers the development of an incident-response team, disaster-recovery processes, and business-continuity planning SEC 280 Week 6 Case Study Computer Systems Security Purchase here http://devrycourse.com/sec-280-week-6-case-study-computer-systems-security Product Description Gem Infosys, a small software company, has decided to better secure its computer systems after a malware attack shut down its network operations for 2 full days. The organization uses a firewall, three file servers, two Web servers, one Windows 2008 Active Directory server for user access and authentication, ten PCs, and a broadband connection to the Internet. The management at Gem needs you to formulate an incident-response policy to reduce network down time if future incidents occur.......

Words: 1375 - Pages: 6

Cis 502 Week 7 Case Study 3 - Mobile Devices Security

...CIS 502 Week 7 Case Study 3 - Mobile Devices Security Click Link Below To Buy: http://hwaid.com/shop/cis-502-week-7-case-study-3-mobile-devices-security/ The use of mobile devices is prevalent and growing rapidly as users heavily depend on them. Unfortunately, attackers follow the money and user population. In addition, mobile devices do not receive patches for their vulnerabilities. The Zeus-in-the-Mobile (ZitMo) attack against Android users is an example defeating the emerging technology to steal user s credentials and ultimately money. Mobile devices can also spread malware. Read the article titled, Mobile device attacks surge andFIPS 140-2 Security Policy. In addition, read the report titled, Emerging Cyber Threats 2012. Write a five to eight (5-8) page paper in which you: 1. Describe the emerging cybersecurity issues and vulnerabilities presented in the Emerging Cyber Threats 2012 report. 2. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices. 3. Assess and describe the value of cryptography and encryption in regard to Equifax s approach to implementing stronger security policies around mobile devices. 4. Justify Gunter Ollmann s comments about Zeus-in-the-Mobile (ZitMo) and describe the implications of advanced security breaches such as this. 5. Several challenges of controlling information......

Words: 302 - Pages: 2

Sec 280 Week 4 Case Study Computer Security

...280 Week 4 Case Study Computer Security Purchase here http://devrycourse.com/sec-280-week-4-case-study-computer-security Product Description Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system. SEC 280 Week 4 Case Study Computer Security Purchase here http://devrycourse.com/sec-280-week-4-case-study-computer-security Product Description Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system. SEC 280 Week 4 Case Study Computer Security Purchase here http://devrycourse.com/sec-280-week-4-case-study-computer-security Product Description Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system. SEC 280 Week 4 Case Study Computer......

Words: 1126 - Pages: 5