Chief Security Officer:
As the Chief Security Officer for a local University, my main role is establishing and maintaining an enterprise wide information security program that helps to ensure all data and information assets are not compromised. This process involves developing a plan to conduct a security program that prevent computer crimes, establishes a procedure for investigation, and outlines laws that are applicable for potential offenders. To develop an effective plan, the process would involve identifying recent computer attacks or other offenses that have been carried out against higher educational institutions and processes established by these institutions to prevent the recurrence of the crimes. In addition, procedures, methodologies, and technologies that could be bought to lessen computer crime threats and effective laws for convicting offenders will also be examined. The other parts of the process include identifying computer crime fighting government programs and the types and costs of computer forensics technology that can be used by the University.
Recent Computer Hacker Attacks or Other Crimes:
The United States is generally a society of openness and freedom, which are central values of higher education institutions. As a result of these values, competitors and foreign adversaries have been taking advantage of these institutions of higher learning. Actually, these adversaries and competitors have taken advantage of the openness in higher education to carry several abuses. This misuse include recruiting individuals for espionage, stealing technical information or products, spreading false information for various reasons, avoiding costly research and development, and exploiting the student visa program for illegal purposes ("Higher Education and National Security," 2011). Consequently, higher learning institutions have become increasingly vulnerable to different types of computer crimes.
In the past few years, higher educational institutions have experienced some computer crimes including hacker attacks. On the week of August 23, 2010, the University of Virginia fell victim to a cyber-attack that contributed to the theft of approximately $1 million. The attackers used malware to illegally obtain online banking credentials for accounts belonging to the college and transferred nearly $1 million abroad. At the beginning of this year, Miami University in Oxford, Ohio, experienced a hacker attack into its system by two students who were eventually charged with hacking the school's system to inflate grades. The other example of a recent hacker attack crime in a higher learning institution occurred this year at Ferris State University, which became a victim to hackers and contributed to numerous risks on the identifying information of thousands of students.
These examples demonstrate that administrators at higher educational institutions are as vulnerable to data breaches as business enterprises. This vulnerability is fueled by the fact that these institutions have several factors that make security more complex as compared to the commercial world. Secondly, these institutions have not had similar level of regulatory compliance pressure as other organizations in the commercial sector (Prince, 2010). Third, these institutions are affected by cultural factors because of their focus on strengthening an open educational environment rather than the need to protect sensitive information.
Processes Established by Institutions to Prevent the Recurrence of the Crimes:
Since these incidents of computer crimes on higher educational institutions have become common, especially hacker attacks, colleges and universities have established various processes to prevent the recurrence of the crimes or attacks. One of the strategies adopted by these institutions is shutting down the server and hiring a computer forensic company to investigate the system and prevent further unauthorized access ("Data Security Breach," 2013). Secondly, some institutions have hired a Chief Security/Privacy Officer to provide direction and guidance on how they gather, maintain, and distribute private information. Third, some institutions consult competent and skilled legal counsel in light of the state and federal regulations associated with data requirements.
However, these initiatives and processes have proven futile because of the constant increase of the number of such incidents. Actually, it's assumed that the number of data security breaches in higher learning will decrease if higher educational institutions get it right. For instance, hiring computer forensic companies to investigate a computer crime have been unsuccessful in some cases because of failure to demonstrate any unauthorized access. While these strategies are not entirely ineffective, it seems that these institutions strengthen their security measures to prevent recurrence of the offenses. In essence, the institutions should not only focus on reacting to computer crimes but addressing factors that contribute to the occurrence of these offenses in the first place.
Technology that can be Purchased to Lower Computer Crimes:
In essence, lessening computer crime threats is increasingly important to higher educational institutions that are vulnerable to such attacks and their effects. The achievement of...
Also, it goes without saying that anyone hired in an important position like this one should have a wealth of experience and knowledge pertaining to information technology and information security (Slater, p. 2). The broad spectrum of activities a CSO must engage in Author Tyler Justin Speed explains that while it security staff can be counted on for the most part to protect stored digital data, unless the chief of
Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework
Security management is "described in some quarters as a function of risk management," (Bulletin 2, Part 2). Although there is some crossover with public sector security functions, such as policing, security management is generally considered a private sector domain. "Whilst private security has a predominantly commercial basis, it should not be forgotten that it does interact with the public to a considerable degree," (Bulletin 2, Part 2). Security management is
Despite these concerns however the world's largest companies still actively promote and routinely hype the value of cloud computing without mentioning the myriad of risk associated with this platform, despite its continual maturation from a security and stability standpoint [2]. An example of this is type of hype is when Microsoft's Steve Balmer described cloud computing as the next frontier and Dr. Ajei Gopal verified that the cloud is there
Security Measures The hotel industry has experienced the need to enhance security of guests in the recent past given the increased security threats/attacks in the modern business environment. The increased focus on enhancing security in the hotel industry has represented a major shift from the serious neglect of various security responsibilities that characterized this industry in the past. According to Fischer, Halibozek & Walters (2013), hotel managers, particularly security managers, are
And the applicant must successfully pass a pre-employment drug screen (Collins, Ricks and Van Meter, 2000). All private security officers must meet the applicable statutory requirements and any criteria that have been established by the employer. In looking at the requirements that have been set forth by the state of Louisiana, the following minimum requirements must be met in order for a person to become a private security officer: 1. The
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now