Security Essay

3132 words - 13 pages


This essay discusses security design options for a problem faced by a newspaper company. National newspaper would like to conceal their activities regarding to publish government’s sensitive information. For months, national newspaper is going to do research involving many allies like government whistle-blower, international collaborator, and other resources. Therefore, the teams who responsible to this issue may need a suggestion about security design between them. They are going to exchange a large volume of data and use communication system between journalists and resources.

Besides prerequisite a strong secure communication system, newspaper company also concerns about confidentiality of work-in-progress stored inside their local storage. They may want to apply secure inventory management to store data securely until it is published. They may give different privileged among their staffs to access their data. They should prevent “a snake in the grass” that probably leak their asset to government, and only trust to small group of people.

This essay will further talk about two main things, how to build secure communication system and how to manage secure inventory management. The thing that should be considered first is the threat. The threat would most probably come from government, who has powerful capability as an adversary. This essay also discusses what kind of threat system can be handled.

Threat Capablities

Most country has its intelligence agencies that doe some secrets activities in order to keep secure their country. Some of them achieve it with mass-surveillance program that now is widely known by public. In India, government owns Centralized Monitoring System (CMS) program that able them to collect data, capture emails, listen phone conversation, and tracking search engine from its citizens [1]. Russia has programs called SORM (System for Operative Investigative Activities) built in mid- 1980. SORM-I is able to eavesdrop telephone communication, including network, SORM-II is able to monitor Internet communication and voice over IP, and SORM-III collecting data from any media [2].

US and UK’s mass-surveillance programs, which has famously become headline of several newspaper recent days, are gathering Internet traffic not only from local citizens but also worldwide [3]. US’s capabilities are powerful with PRISM as well as UK’s with its Tempora. Since snowden-leaks issued recently, there are several articles in web that discuss how those programs work technically. This essay will take US and UK surveillance model as a reference to build threat models for this newspaper company. Identification of threat capability in this essay is limited with what that has been leaked by whistle blower, and those that has been written in media. It doesn’t cover if government still has top-secret technology that has not been published.

As it has been mentioned before, United Kingdom has its Tempora as a mass-surveillance program....

Find Another Essay On security

Security Audit Essay

2192 words - 9 pages Security auditing in any company involves establishing security levels in the company’s system. It comprises of vulnerability scans, reviewing applications and systems controls, and analyzing physical access into the system. Auditing is carried out to ensure information integrity of a company’s data and reliability of data exchange process through networked environment. In most cases, security auditing is done to ensure security measures are in

Computer Security. Essay

1948 words - 8 pages information and create security plans that will meet this new challenge. Computer security controls work with a different set of variables than those used for mainframes and LANs. For example, control over program changes, data security, system documentation, backup, recovery plans, and system testing are inherent in most mainframe (LAN) environments. However, desktops, laptop, and handheld computer systems seldom have this protection. One of the most

Social Security

2509 words - 10 pages AbstractThe purpose of this paper is to address the development of a Social Security Act through its historical phases. Social Security has two distinct meanings in American life. Specifically it refers to the old age insurance system established by the Social Security Act of 1935. It also describes a much broader goal: the protection for all citizens against a wide range of suffering, including poverty, homelessness, disability, and ill health

Airport Security

1538 words - 6 pages PROBLEMS IN AIRPORT SECURITY The crash of TWA Flight 800 combined with increased terrorism in airports had led to more rigid security measures. Anyone who has flown recently has discovered that at most airports when you want to get your boarding pass, you must show a picture identification. This same procedure is followed when checking your baggage outside the terminal building. Considering the bombing of the World Towers, the Federal

Private security

2668 words - 11 pages James Graziadei 10-24-14 Mr. Williams - Final ProjectV.I.P.E.R SECURITY L.L.CMission StatementTo provide the best security and consulting services to our clients by demonstrating responsiveness, diligence, judgment and building on our culture of excellence.Vision StatementViper Security strives to be the highest quality security agency in the nation. We will exceed the expectations of those we partner with by:Being the best service contractor

social security

2265 words - 9 pages Social Security Since the beginning of time there has been a longstanding tradition of the workers supporting the elderly. This was practiced during biblical times, with the children supporting their parents, and has continued to the present day. As times changed and humans developed more as a society, it became apparent that everyone should be required to support those who cannot work. The goal in mind is to provide everyone with economic

Homeland Security

1870 words - 7 pages Homeland Security PAGE 1 Homeland SecurityNameCourseInstructorDateHomeland SecurityThe United States of America used to be confident in the knowledge that the country was safe from war and acts of terrorism due to the fact that America is surrounded by oceans and seas that effectively deter any violent attacks upon the country. The Japanese proved this theory wrong when they successfully attacked Pearl Harbor and engaged the United States as

Network Security

1567 words - 6 pages Network Security 1. What is network security? Network security has changed significantly over the past years. There is more and more data to monitor and analyze in order to detect the activity of your data and systems. Securing a network has many variables. Password authentication, network access, patches, anti-virus protection, intrusion detection, firewall and network monitoring tools are just a few of the things you can do to


540 words - 2 pages NOT TOO INDEPTH BUT COVERS BASICS -The book Computer Security written by Time Life Books, explains what computer security is, how it works, and how it affects peoples lives. Without computer security peoples private information can be stolen right off their computer.Computer security is exactly what it sounds like. It is security on a computer to prevent people from accessing a computer. It is very difficult to secure a computer for a computer

Network Security

1286 words - 5 pages Network Security Network security is a problem that network administrators face. It is something that network administrators should keep a careful eye on. For example, if the home network does not have any security measures in place, then the person is at a high risk of data loss due to hacking. Network security is something that businesses do not take very lightly because they want to protect their valuable information and network

information security

1354 words - 5 pages IT securitySometimes referred to as computer security, Information Technology Security is information security applied to technology (most often some form of computer system). It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory. Such devices can range from non-networked standalone devices as simple as calculators, to networked mobile computing devices such

Similar Essays

Internet Security Essay

1517 words - 6 pages Internet Security Internet Security is the most important aspect of information technology. It has been years since computer has been invented and to keep the information confidential we have to safeguard this information. The importance of integrating security measures into systems development. Every business has their own security systems to reach their goals of information security. The computer world created security systems in

Cyber Security Essay

752 words - 3 pages In contemporary context of global information era, the issue of cyber security is considered to be one of the key elements, which determine overall company's performance, competitive advantage, and image. From the critical point of view, the major controversy of cyber security is embedded between methods of control and monitoring, in particular its centralized or decentralized regulation. Practically, opinions of the specialists in regard to

International Security Essay

1513 words - 6 pages A basic understanding of the concept of security may be defined as; protecting ones interests from external threats. This concept of security in the context of daily usage seems a rather simplistic idea given that basic definition. However, a more in-depth examination of the concept of security reveals the true complexity concerning the nature of security and what it attempts to encompass, especially when the term ‘security’, used in a daily

Social Security Essay

1179 words - 5 pages Social Security      Social Security is a public program designed to provide income and services to individuals in the event of retirement, sickness, disability, death, or unemployment. In the United States, the word social security refers to the programs established in 1935 under the Social Security Act. Societies throughout history have devised ways to support people who cannot support themselves. In 1937 the