Preview

SkillPort Security

Good Essays
Open Document
Open Document
647 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
SkillPort Security
Importance of Network Security
Having the proper security measures is very critical when running a business. It can be very expensive for an organization to keep an updated security system but in the end, it is well worth the money. No manager should want to even take the risk of letting hackers or viruses into the organizations information system. To fully understand why it is critical to have security measures, you first need to understand the different threats a network can face. Having a good secure network can prevent things such as malware, social engineering attacks, spam, and phishing. All of these can be very dangerous and damaging to your network. As a manager it is also very important to have a thorough security policy that states the precautions and also the steps to take in case of a security breach. When choosing security controls for your business you must consider three things; what security controls does your business need to safeguard the information systems, the safety and protection that security controls should provide, and existing security controls and how they have been implemented.

Discuss the role that preparing employees to recognize and respond to social engineering techniques should play in the organization’s overall information security program. Note three specific social engineering techniques. Discuss how they can be recognized and how to best prepare employees for each potential attack.
Well trained employees play a huge factor in protecting the network. Many viruses and malware can be prevented just by paying attention and having a trained eye. It is important that employees can recognize and respond to social engineering techniques. Social engineering is a method that attackers use to gain information to make their attack successful. In other words, it is a method of gaining confidential information. Social engineering has been around for a very long time and it is the most basic way to bypass an organizations security.

You May Also Find These Documents Helpful

  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    Explain the organizational approaches to information security List and describe the functional components of an information security program Determine how to plan and staff an organization’s information security program based on its size…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Is411 Study Guide

    • 2595 Words
    • 11 Pages

    A perfect policy will not prevent all threats. Key to determining if a business will implement any policy is cost. Policies support the risk assessment to reduce the cost by providing controls and procedures to manage the risk. A good policy includes support for incident handling. Pg 15…

    • 2595 Words
    • 11 Pages
    Good Essays
  • Good Essays

    IS3110 Quiz 6 2015

    • 600 Words
    • 2 Pages

    2. Using the USER domain, define risks associated with users and explain what can be done to mitigate them. Are related to social engineering. Users can be conned and tricked. A social engineer tries to trick a user into giving up information or performing an unsafe action. You can try to minimize these risks by raising user awareness. Implement acceptable use policies (AUPs) to ensure users know what they should and should not be doing. Use logon banners to remind users of the AUP. Send out occasional e-mails with security tidbits to keep security in their minds. Use posters in employee areas.…

    • 600 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The possible loss would depend on the sensitivity of the data and how it's used. For example, if the unauthorized employee accessed salary data and freely shared it, this could impact morale and productivity.…

    • 5836 Words
    • 24 Pages
    Good Essays
  • Good Essays

    Hacking

    • 681 Words
    • 3 Pages

    Ans: social engineering is a type of information gathering, social engieneering can include, impersonation of someone over the phone, sending emails or IM chats asking for information, phishing can be used to gather information that can be used to gain access to secure systems or information.…

    • 681 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Kabay, M.E., & Robertson, B., Akella, M., & Lang, D.T. (2009). Using social psychology to implement security policies. In Bosworth, et al (Eds.), Computer security handbook. New York, NY: John Wiley & Sons…

    • 2426 Words
    • 10 Pages
    Best Essays
  • Good Essays

    Security Assessment

    • 856 Words
    • 3 Pages

    If I were to be hired as a consultant to perform a network security assessment for a large firm, there are a few things that I would have to keep in mind to provide my client with the best outcome possible. I would fist begin by explaining what a security risk assessment is to the client. I will explain that the security risk assessments that will be utilized is basically used to recognize the chance that there is an openness that can be exploited in their IT systems. We will begin by first determining the likelihood that a threat such as a hacker or an error will try to abuse the weakness and then determining the probability that the attempt will be successful.…

    • 856 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Mis Assignment

    • 465 Words
    • 2 Pages

    security is also critical to ensure that integrity of organization's data is maintained and confidential information about clients or customers is not leaked, thereby ensuring the privacy of customers ,In making the choices it would unfair to categorize the decisions as either wholly a technology issue or wholly a business issue anymore than the choices regarding accounting might be categorized as either wholly a technology issue or wholly a business issue.…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The main goal or focus of social engineering is to use human weakness to gain access to secure systems and or data. Despite the implementation of a wide range of security controls and measures into a secured system; there will always be a human linked to the system. Humans are the weakest link in all secured systems. “Securing the hardware, software, and firmware…

    • 1438 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Security Risk Management

    • 1120 Words
    • 5 Pages

    Hu, Q., Hart, P., and Cooke, D. 2006. “The Role of External Influences on Organizational Information Security Practices: An Institutional Perspective,” in Proceedings of the 39th Hawaii International Conference on System Sciences, Los Alamitos, CA: IEEE Computer Society Press.…

    • 1120 Words
    • 5 Pages
    Best Essays
  • Good Essays

    E-Commerce Security

    • 498 Words
    • 2 Pages

    Any business that operates online is going to be at risk from internet threats and because of this the business must ensure to implement security on its network systems. Businesses need to be able to show that they can keep customer information safe and secure, this will reassure potential customers and widen your market potential.…

    • 498 Words
    • 2 Pages
    Good Essays
  • Good Essays

    cyber fraud

    • 341 Words
    • 2 Pages

    Strengthening security control: Security controls are more important as it involves the usage of technology. The customers should be authenticated, verified and their identities…

    • 341 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Information Gathering

    • 359 Words
    • 2 Pages

    Social engineering means getting information verbally by merely asking, or the electronic way of it is known as phishing. Secondly, by using published information. This is gained by searching the particular target online via Google search to obtain any information regarding the target. Thirdly, by using port scanning. We can download the tools and find the ports used by the target. Lastly, by using network mapping. Network mapping is the study of the physical connectivity of networks and often attempts to determine the servers and operating systems run on networks.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Reflection

    • 354 Words
    • 2 Pages

    Another topic that was discussed in class was Threats to Information Security. One example that was discussed in class was about a call placed to a retail store and information was given by the receptionist and all data was hacked by the caller. At our work places calls regarding information needs to be approved by management before anything can be sent through email or fax. There are security passwords set in place for this same reason.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The maximum exploitation of technology exits at workplace where personal computers, network systems, Internet access, e-mail and telephones are easily accessible for employee’s use. Employers’ greatest risk to their computer security comes not from outside hackers but from current and former employees who intentionally or inadvertently disclose confidential or sensitive information. Employees no longer have to photocopy documents behind closed doors; they can simply download package of data to disk, CD or DVD, or even e-mail the information to a competitor with the click of a mouse.…

    • 493 Words
    • 2 Pages
    Good Essays