This website uses cookies to ensure you have the best experience. Learn more

Security Risks Essay

1552 words - 7 pages

With evolving technology, the risks involved with using computer technology increase. Years ago we could not have anticipated the risks we face today. Ten years ago a computer was susceptible to viruses and Adware. We still worry about viruses and Adware, but we face new dangers.
In the computer security world, we use a term called the CIA Triad. The CIA triad stands for confidentiality, integrity, and availability. The way it works is you imagine a triangle with each side representing one of the three terms. Once you have your triangle the goal is to balance you or your organization in a happy medium in balance with the other sides. Basically, by locking down our computers, we protect ...view middle of the document...

When people install a new electrical device that access their wireless network, they enter the wireless key, get it on the network and forget about it. Once someone accesses these devices, then they have a gateway into your network. The act of hacking one of these devices could cause more serious implications. To emphasize my point, let me give an example. Some insulin machines have wireless networking capabilities. As a hacker, I could hack into someone’s insulin machine, increase their dose, kill them with an overdose, and set the machine back to the standard dose to cover my tracks while sitting in a café on the other side of the planet.
The implications of these risks exist out of the office or home. In the past couple years, a couple major issues have been made public. One of which is the ability to hack an electronic door lock that uses a card like you see in hotels. This device can be made for around forty dollars. Another technology that was made public this year is the ability to hack a car. Hackers can now control your acceleration, and brakes remotely. Just think, you could cut someone off on the highway, and, as a retaliation, they could hack your car. They could tell it to accelerate to 150mph, then slam on the brakes. Kind of shines a new light on road rage.
I spoke at a technology conference this year, where I informed the attorneys who attended about the dangers associated with technology. One of the common topics was smart phones, tablets, and the security risks associated with these devices. When we are at a location with internet service, we have extra security from firewalls and things along those lines. Even home wireless routers offer some protection. When we are on the road, our mobile devices do not have that extra layer of security. This lack of added security causes our mobile devices to be easier targets.
A common method to gathering user data is to setup a false Wi-Fi hotspot. For example, a person interested in gathering information can go to a place that offers free Wi-Fi, like a coffee shop. Once there, they can setup their own hotspot using the same name as the free hotspot. When a person unknowingly uses the fake hotspot, the person who setup the fake can collect all of the data going across the line. That includes all emails, transactions, or files transmitted.
The information we keep on our portable devices can be just as damaging as the damage we keep on our desktops. If a business person checks email on their phone then they carry with them all of their correspondence which can include important business information, and contact information. Important data does not stop with business applications. Every time a person uses a mobile device for financial transactions, or checking bank accounts they are putting sensitive information into a device with little protection.
The data is often things that we simply do not want to see out in the open. There are a number of stories where a celebrity has pictures of...

Find Another Essay On Security Risks

My paper discusses how applied information management systems have a variety of risks and the different types of security you can get

2007 words - 8 pages 1) Chapter four, or Personal, Legal, Ethical, and Organizational Issues of Information Systems, mainly touches on different information technologies and organizational issues. There are many risks that are associated with information technologies, which "can be misused to invade users' privacy and commit computer crimes" (57). The first way privacy can be invaded is by using cookies, which "are small text files with a unique ID tag that

Australia's security relationship with the United States has both great benefits and great risks

686 words - 3 pages has now been withdrawn from this treaty; claiming that they could not accept the United States' policy positions on nuclear powered and armed warships New Zealand had alienated The United States. America considered these to be necessary conditions of an effective alliance and withdrew its treaty obligations towards New Zealand. For Australia however, this treaty is our single most important security alliance and the government doesn't appear to be

International Financial Management: BHP

1862 words - 8 pages BHP Company has developed and employed a policy called as the Portfolio Risk management Strategy that is based on managing exposures and financial risks that include the interest rates, movement of currencies, and prices of different commodities that are offered by the business organization. This policy ensures that the business organization is able to secure the company's financial security and ensure flexibility in finance management. Under

Intorduction To IT Security

1201 words - 5 pages data from being in-advertently distributed across networks. Act as a deterrent to those trying to access the network illegally. Or warning users of the potential harm their actions may cause. In developing an IT security strategy, potential risks will need to be anticipated along with policies and procedures for the effective mitigation of these risks. There needs to be governing documentation that entails network design as well as security

Security in the Business Environment

1919 words - 8 pages , and simple human error. The types of threats change constantly, so management must sponsor, design, and implement business and technical processes to safeguard critical business assets. To create a more secure business environment the organization must: • Assess business exposure and identify which assets to secure. • Identify ways to reduce risk to an acceptable level. • Design a plan for mitigating security risks. • Monitor the

Internet Security

1517 words - 6 pages Security Software please see: http://www.alw.nih.gov/Security/security-prog.html. SECURITY INFORMATION RISKS Although all information systems have standard measure there are still risks everyone has to be aware of because they can somehow get into your computers and steal confidential information. Examples: Natural Disasters (like tornadoes it can destroy your hardware), Blackouts and Brownouts and Vandalism. These are some of the risk

Information Technology – Structure of Data

1139 words - 5 pages implementation of wireless communications networks and use of wireless devices. Each new development will present new security risks, which must be addressed to ensure that critical assets remain protected. Actions that organizations should take to protect the confidentiality, integrity, and availability of all systems and information include: assessing risks, testing and evaluating system security controls for wireless networks more frequently than for

Security Management Models for Information Systems

1014 words - 4 pages diligence on security management mechanisms for the value of their respective organizations. What I gather from my research is that security management of information systems is currently in an environment with elevated security threats and as a result of this individuals must be aware of information security risks and vulnerabilities. Security professionals must be conscious in the “development and implementation of scenario-based” (Grimaila, 2004

Educating Information Technology Staff

1318 words - 6 pages Evaluation of Security Approaches In this section, we will briefly discuss both perceived positive and negative effects on approaches to reduce risks to information. The effects will be concentrated on the items previously discussed concerning training methods used to education employees on information security issues. An entity incorporates various training approaches to educate personnel on matters that support the goals of the

The IT Department and Virtualization

994 words - 4 pages to determine the type of risks that are associated with the use of a virtual environment. After reviewing this information the IT department collaborated with the internal network security team to identify the following risks within a virtual based infrastructure. Risks Identified Following the research into some the most common virtualization issues the following risks were identified within our infrastructure: • Failure to segregate duties

paper

799 words - 4 pages new opportunities are very much significant and the trend that was explained above, BYOD all these can lead to a real cost savers for the companies. But the catch here is that along with such facilities there comes a complex and an unprecedented set of security and compliance risks that would demand a thoughtful and creative approach to Mobile Risk Management. Risks MRM address MRM is mainly focusing on risks that are in association with

Similar Essays

Controls To Diminish Information Security Risks

2320 words - 9 pages Controls to Diminish IS Risks An assortment of hardware and software is required to build the recommended infrastructure. A managed security service provider (MSSP) administers the hardware and software components (Bass, 2013). The MSSP has the duty to preserve the security infrastructure and monitor it for any relevant occurrences. Every portion of the security hardware executes an indispensable function intended to diminish the risk to the

Risks And Potential Impact Relating To Security, Auditing And Disaster Recovery

600 words - 2 pages will be on file with the insurance company and at an offsite location. System backups are also secured at an offsite location. Additionally, approaches to the elimination and minimization of the risks are suggested.Risk rating is as follows: 5 - Very High Risk; 4 - High Risk; 3 - Medium Risk; 2 - Low Risk; 1 - Very Low RiskTABLE 1 - SECURITY RISK ASSESSMENTAssets &FunctionsWeightHuman ErrorViruses, WormsTheft of Property / InformationHackers

The Risks That International Works Present To The United Arabic Emirates (Uae) Nationwide Security

2267 words - 10 pages This thesis will deal with the risk that international workers presents to UAE nationwide security. Moreover, this thesis will talk about the problems of the government due to of immigration employees and the need for UAE to recommend techniques for dealing with these problems and risks while reducing the effect on UAE citizens and their way of life. Also this article will display the features offered to immigrants by UAE government enhancing to

This Essay Is About Secruity Risk List Four Possible Security Risks That The Bank And The Clients Are Facing In The Present Network Setup. Explain Clearly Why These Security Risks Exist

1481 words - 6 pages Question 1a. List four (4) possible security risks that the bank and the clients are facing in the present network setup. Explain clearly why these security risks exist.There are 4 possible security risks that the bank and the clients are facing in the present network setup.Firstly, there may be a possible security risk of interception occurs. Interception means that unauthorized party gain access to an asset. Because client send their