Verified Document

Security Threat Is A Potential Happening That Essay

¶ … security threat is a potential happening that may have an undesirable effect on the system, its resources, or the organization as a whole. Vulnerability is the weakness that makes it possible for the threat to occur. There are a number of threats that can occur on a system, and are usually grouped together since some overlap. Errors and Omissions -- Data entry, data verification, programming bugs.

Fraud and Theft -- Skimming and/or controlling access to the system for profit.

Employee (or Outside) sabotage -- Destroying information or planting viruses, stealing proprietary data or customer information, etc. (NIST, 2012).

Similarly, there are a number of losses that can occur based on threat and vulnerability; some more serious than others, and all somewhat dependent on the type of organization under analysis. For instance, a bank's security loss might be different than an academic institution's, but both are a data loss. Losses may result in: 1) data or information loss (customer information, financial information, personal information, etc.); 2) time (down time, rebuilding data type, human resource time); 3) reputation (loss of business due to security issues or fraud); 4) legal vulnerabilities (HIPPA for medical, privacy regulations, etc.); 5) equipment (technical or hard goods). An acronym to help us understand these losses may be based on a Risk Assessment model called...

Malware may appear in a number of forms: code, scripts, content, or even software. It is a general term used for hostile or intrusive software that includes viruses, ransom ware, worms, Trojans, dialers, spyware, adware, and other hostile programs. Malware can be protected against, detected, or removed depending on the approach. Most experts believe, in fact, that even on the simplest of systems, a layered approach is necessary (Kassner, 2009).
Because malware attacks are now so frequent, there are several ways to help protect against intrusion: 1) Anti-virus and/or anti-malware software; 2) Backup and recovery strategies (regular and robust); 3) Website security scans; 4) Elimination of over-privileged code (streamline software coding for security); 5) Password security (change regularly and ensure security measures followed); 6) Update system when it is needed (e.g. critical updates for your system often include anti-malware properties); 7) Create a system of firewalls (protect against threats before they happen). Additionally, many computer security experts believe that Active X Security Settings should be regularly adjusted from default…

Sources used in this document:
Sources:

Best Practice for Computer Security. (2011). Indiana University Information Technology Services. Retrieved from: http://kb.iu.edu/data/akln.html#polp

Bishop, M. (2003). Computer Security: Art and Science. Boston, MA: Pearson Education.

Brenner, S. (2010). Cybercrime. Santa Barbara, CA: ABC-CLIO.

Kassner, M. (2009, August). 10 Ways to Detect Malware. TechRepublic. Retrieved from: http://www.techrepublic.com/blog/10things/10-ways-to-detect-computer-malware/970
MajorGeeks.com. (2010). How to Protect Yourself Against Malware. Retrieved from: http://forums.majorgeeks.com/showthread.php?t=44525
National Institute of Standards and Technology. (2012). Threats to Computer Security. Retrieved from: http://alcor.concordia.ca/~helpline/security/threats.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Non-Traditional Security Threats and the EU
Words: 8197 Length: 23 Document Type: Term Paper

Non-Traditional Security Threats and the EU Theoretical Study Terrorism Weapons of Mass Destruction and Nuclear Threat Regional Conflict Organized Crime Environmental Degradation Non-Traditional Security Threats and the EU Due to the discontentment with the conventional concepts of security, the research schedule based on these conventional concepts, associated theoretical debates and their impact on policy, have given rise to the idea of non-traditional security. In the present era, it is universally acknowledged that security possesses multifaceted characteristics. Growing from

Security Issues of Online Communities
Words: 15576 Length: 60 Document Type: Term Paper

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Security Programs Implementation of Information Security Programs
Words: 1415 Length: 4 Document Type: Essay

Security Programs Implementation of Information Security Programs Information Security Programs are significantly growing with the present reforms in the United States agencies, due to the insecurity involved in the handling of data in most corporate infrastructure systems. Cases such as independent hackers accessing company databases and computerized systems, computer service attacks, malicious software such as viruses that attack the operating systems and many other issues are among the many issues experienced

Thematic Analysis of Security Issues
Words: 20201 Length: 78 Document Type: Dissertation

Security Study Travel and tourism are major industries in European countries such as Greece. The hotel industry is dedicated to making the accommodations for their patrons as enjoyable as possible. This means ensuring that hotel guests, visitors, and staff have a safe and secure environment. It is for this reason that many of the larger hotel chains have their own private security personnel who are entrusted to maintain the safety of

Security Vs. Privacy in the
Words: 2504 Length: 9 Document Type: Term Paper

This has been the basic rationale for every totalitarian state during the Twentieth Century. It is the idea that if the people relinquish their rights -- especially their rights to keep anything hidden from the government -- then the government will be better able to ensure that no potential threats to the security of the citizenry ever manifest themselves. This premise, however, is based on the faulty idea that

Security Council France Over the
Words: 1323 Length: 3 Document Type: Essay

This is because it was not officially ratified by the U.S. Senate. The reason why, was due to the underlying fears of the damage that it could cause to the economy. This would create the atmosphere that various provisions were unfair for the U.S., leading to its eventual withdrawal from Kyoto. (U.S. Withdraws from Kyoto Protocol 2001) When such a large country will no longer follow these different provisions,

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now