Computer and Network Security
Description of Information Environment of my Workplace
My workplace is Verizon Communication and I have been working for the company for more than 5 years. The Verizon Communication major business is to provide communication solutions for businesses and individuals through the wired and wireless communication devices. The company provides complete communication systems and devices for individual, small business, medium business and enterprises. However, the company sells bulk of its product online and the nature of its business requires the company to collect large volume of data and information from customer, employees, suppliers, shareholders, and other stakeholders. In carrying out its business objective, the company collects sensitive information from customer that include names, addresses, phone number, email address, and credit card number. In essence, the company uses the internet to collect the customer credit card information to process and complete the order. The data collected from the customer assists the company to create growth and opportunities because the data collected make the company to understand the top price to pay for particular product, and understand customer preference from specific geographic locations. The information collected assists the company to design its marketing plan.
Although, internet offers dynamic opportunities for our company because it assists in reaching customer located at wide geographic locations at low costs, however, our company faces some risks by using the internet technology to transact business because web and internet are highly vulnerable to various attacks.
In the United States, the DoS (Denial of Service), cyber espionage, point-of-sale intrusion and payment cards skimming are on the increase making the Verizon to face the threats on its information infrastructures. Over the years, Verizon is facing challenging to manage these threats based on the increase of attacks on the IT infrastructures in the United States.
2: Potential Threats to the Company Information Environment
Since the Verizon is using the internet to transact business, the company faces some inherent risks. For example, the hacker may capture customer username, password, and credit card information while transferring the data over the network. Some unscrupulous individual may also attempt to steal the company sensitive information using the sniffer program. Moreover, the hackers may attempt to steal workers' password using port scanner to penetrate the company network system. (Burr, Ferraiolo, & Waltermire, 2014).
The company is also susceptible to passive and active attacks. One of the passive attacks includes eavesdropping of the network traffic to gain access to the sensitive information supposed to be restricted from the view of outsiders. On the other hand, active attacks include altering information in transit between server and client, stealing of username and password and impersonate another user or alter website information. The nature of the business of Verizon Communication makes the company to face confidentiality risks that include eavesdropping, virus or Trojan horse attack and electronic fraud. In essence, hackers may use some malicious software to steal the company sensitive information. The company also faces the DoS (denial of service) attacks, which could prevent the company to carry out business operations on time.
By consequence, our company is susceptible to several attacks because the internet is opened to several vulnerability, which may make our company to lose several million of dollars if immediate action is not taken to implement effective security protocols to the company information systems. Moreover, Verizon Telecommunication outsources some of its IT functions to India in order to cut costs. In essence, the company faces some network and computer risks because the company will need to communicate to its contractors using the internet.
At this stage, the management is required to hire information security experts to conduct comprehensive security audit to the company information systems. The company management should also approve enough funds that will cover the costs of implementing security auditing, and the implementation will assist the company to identify the likely threats to the company information systems.
The table 1 provides the summary of the likely threats to the company information infrastructures that need urgent attention.
Threats
Consequences
Countermeasures
Authentication
Data forgery
Legitimate user impersonation
User misrepresentation
Belief in invalid information
Cryptographic
techniques
Integrity
User data Modification
Infected the browser with Trojan horse
Memory modification
Message in transit modification
Loss of information
Compromise of the company machine
Vulnerabilty of the company to all other threats checksums
Cryptographic
Confidentiality
Eavesdropping of the company information on the net
Theft of the company information from the server
Theft of the client data
Configuration of the network
Steal information from the server
Loss of privacy
Loss of information
Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of
Computer Vulnerabilities Computer Security Vulnerabilities The extent of the problem This is not a small issue. The book "Analyzing Computer Security" lays out the following scenario: "First, 20 million U.S. smart phones stop working. Next follow outages in wireline telephone service, problems with air traffic control, disruptions to the New York Stock Exchange, and eventually severe loss of power on America's East Coast" (Pfleeger & Pfleeger, 2011, 3). The authors are talking about
The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010). C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it
who have access to the network do not maintain proper security procedures and remain well-informed regarding potential risks and updated procedures and policies (Cobb, 2011; Whitman & Mattord, 2011; ICR, 2008). Any security policy must, after being properly designed and established, be communicated clearly and comprehensively to all relevant personnel, which in today's organizations typically means anyone with access to a company computer and/or the company network, or who
Computer Security Over the last several years, cyber attacks have been continually rising. This is in response to emerging threats from nations such as China who are increasing their attacks on government and military installations. According to James Clapper (the Director of National Intelligence) these threats have become so severe that they are surpassing terrorism as the greatest challenge facing the nation. To fully understand what is occurring requires focusing on
Computer Security Information In the 21st century, information is the key to almost every organization's success. Data is the lifeblood of business -- the information one uses to be competitive and the information that spells success or failure in the marketplace. Data is so important that an entirely new security focus has arisen -- Computer Information Security. In an era in which we must choose which issues for focus, the issue
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now