Information Technology White Paper

1186 words - 5 pages

Tan Pham

CSIA 303

Information Security White Paper

Professor Gupta

Information Security White Paper
The internet and its technology have brought many advantages and disadvantages for information system of businesses, whether public or private. There is no denying that the business world will move further and further into the cyber world, where information are available just by a click of a finger. No matter how large of a scale a business is, private restaurant or large Banking Corporation, the truth is every single one of these business is at risk. Risk of losing trade secret and risk of losing employee’s confidential ...view middle of the document...

What Apple Inc. did for their database security are call authentication and authorization. Authentication is a process of validating a certain individual’s identification. For example, a person who wants to log into a system must provide their ID and then authenticate him or herself by providing a password. Authorization comes after authentication. Authorization grants permission or authority for an individual toward accessing certain information after they have authenticated their identity. For example, an administrator of a networking company will be able to access to users’ database and a regular employee will not have the same privileges. Authorization however is consider a double edges swords because it raise the issue of insider threats and data theft. Insider threats are individuals that work inside of the organization that can potentially cause harm to that organization. Insider threats are actually the biggest risks that a business will ever encounter. According to a research by Andrew P. Moore and Dawn M. Capelli, 65% of insider’s threats are current employees of the organization and 80% of them has already accepted job offer from a competing organization. 63% of these insider threats case involve in trade secrets. These statistics raise a big question for organization and even small business on how to deal with their own employees. These organizations must continuously monitor their employees on a daily basis by using security camera and event log that can be installed in a computer system. Before hiring a certain individual, a business has to check his or her background to ensure he or she doesn’t involve in any cyber crime. Treating employee well and know how to handle employee’s firing are essential actions that an organization must learn to adapt.
Integrity of information is to ensure that piece of data cannot be altered or compromised. Why is this component important for any kind of business nowadays? Imagine an attacker sends a malicious virus to a system of a bank and it corrupts files regarding to accounting information. Since banking information involve a lot with money data, this attack can cause major problem for that bank. A malicious virus is a computer program that can disrupt file and cause further harm to the information system as a whole. Back in 2000, a virus called “I Love You” has worldwide infected information of thousands of people. According to an article written by Larry Seltzer, the virus disguise as an attachment in emails that were sent to its receiver. Once the attachment is open, the virus overwrites itself onto music files and document files, which violating integrity of data. As a business owner, one should be concern that these viruses will have great potential to corrupt important...

Other Essays Like Information Technology White Paper

Technology Choices Essay

916 words - 4 pages has changed the way teachers and students learn in the class. Before the use of technology was brought in the classroom teachers wrote information down on chalkboards and students had to copy down things in notebooks or on paper. The invention of the internet only made the explosion of information even faster. Some may feel the view of what makes someone an educated person has evolved over the years. Once teachers enter in the classroom they

White-Collar Crime Essay

2574 words - 11 pages statistics from more recent times, there is a slight difference in the percentages, but for the most part the main characteristics are the same. In this graph, it shows three different lines. One line is for white offenders, another for male offenders, and the last is “seen” offenders. The different crimes measured are property crime, embezzlement, counterfeiting, fraud and bribery. For the purpose of this paper, I am only going to talk


1720 words - 7 pages AX. This module enables the HR department staff, without any programming capability, to identify, capture, maintain, and adjust employee information required from the application stage through to retirement, in both Arabic and English. See what it does. CASH MANAGEMENT RESEARCH PROPOSAL SAMPLES: Alfanar HR Management Alfanar HR Management Source: Alfanar IT Document Type: White Paper Description: Alfanar IT, an information technology company

The Impact of Apple

1290 words - 6 pages acted and continued to act to promote Post-Modernism. This paper seeks to illustrate Apple Computing’s impact through the use information technology via Modern and Post-Modern perspectives.   A culture of calculation is centered on hierarchical, logical arrangements, where the identified truths are those that are based in fact, not on opinions, beliefs, or feelings. Modernism is a core tenet to a culture of calculation. Modernism emphasizes that

The Evolution And Impact Of Information Technology In Businesses

1273 words - 6 pages speeding up the work flow process. Digital filing systems save space, paper and printing costs. The use of computer systems allows corrections to be made instantly. Resources like electronic files and access to information technology are available with the click of a button (Scott,). In the field of Human Resource (HR) it has improved the efficiency of screening, recruiting and hiring potential candidates. Businesses utilize the internet to spread the

Foreign Policy

2225 words - 9 pages technology and encourage renewable sources like wind as outlined on the website of (South African Government White Paper on Foreign Policy 2011). To great disappointment, scholar (Watson n.d.) observed that little support is given to these sources. In 2011, the public campaign of “One million Climate Jobs” demanded for the State to use electricity from wind and solar power (Austin-Evelyn 2011). However the negligence highlight the Foreign Policy`s

How Technology Has Changed the Classroom

1086 words - 5 pages With the vast and rapid development of science and technology, a computer is no longer considered as a source of luxury but it’s a requirement of the modern days. Computer technology has provided students of all ages the chance and opportunity to expand on what interests they have. It also provides them help in improvement of their homework and test scores. The computers can offer newer ways of getting information across to their fellow

The Effects of Technology on Accounting

777 words - 4 pages THE EFFECTS OF TECHNOLOGY ON THE ACCOUNTING PROFESSION PAPER JEANETTE SANDERS XACC/210 JUNE 8, 2014 RICHARD VINCENT Abstract THE EFFECTS OF TECHNOLOGY ON THE ACCOUNTING PROFESSION PAPER Thirty years age most financing accounting was done by hand, which indeed left a long paper trail. “Currently, most accounting information is recorded via computers and wide area networks (Journal of Accountancy, 1994). Technology has changed

Poison of the Youth

3557 words - 15 pages . Meanwhile, technology helps aids in developing children’s prowess. With different gadgets and new inventions, they can enhance their abilities and enlighten their minds of the information they can obtain from technology. They can entertain and educate themselves at the same time with the use of multimedia. But is technology really poisoning childhood? Is it right and just to accuse the mindless machineries? The purpose of this paper is

Information System

609 words - 3 pages Information Systems Paper Information Systems Paper In an organization, information systems support the business process. The interconnected permutation of processes in an organization’s information system will be described in the following except as well as will identify and describe how information systems generate information, which supports organizational activities. Included will be a description, along with the strength and

Emerging Trends in Retail Sector

1908 words - 8 pages internet confidence on online shopping intention in the integrated multi-channel context”, International Journal of Retail & Distribution Management, 39 [2], pp: 126-141. Lewis, S., 2004: A basic introduction to RFID technology and its use in the supply chain, Laran RFID, White paper. Retail Systems Research Retrieved on 26 December 2012 Hoffman, L., Kalsbeek, W.D. and Novak, T. P. (1996). “Internet and web use in the US”, Communications of the ACM, 39 [12], 43-54.

Related Papers

Information Technology Acts  Paper

673 words - 3 pages   BIS/220 Version 1 April 9, 2010 Information Technology Acts  Paper Many laws have been implemented by Congress to protect the integrity of United States citizens.  With this fast technology  growth. Several of these laws are not even ten years old,   especially some Information Technology Acts.  As the nation grows, our laws grow just as fast.  Information Technology is the “acquisition, processing, storage and dissemination of vocal

Hsc/320 Communication And Information Technology Paper

888 words - 4 pages Communication and Information Technology Paper HSC/ 320 July 19, 2011 The electronic medical records are medical records that are computerized for the use of hospital or office of physicians. The system allows storage, modification and retrieval of patients’ records. This is efficient because it eliminates the records being paper based and doctors can record data at the moment they are talking to the patient. The

Global And Chinese White Cement Industry, 2009 2019 Market Research Report

1039 words - 5 pages Global and Chinese White Cement Industry, 2009-2019 Market Research Report Market Research Report on Global and Chinese White Cement Industry, 2009-2019 is a professional and in-depth market survey on Global and Chinese White Cement industry. The report firstly reviews the basic information of White Cement including its classification, application and manufacturing technology; The report then explores global and Chinas top manufacturers of White

Paper Recycling

4041 words - 17 pages information is still stored on paper. [Source: International Institute for Environment and Development (IIED) Discussion Paper (IIED, London, September 1996)] | | ▪ Recycling 1 short ton (0.91 t) of paper saves 17 mature trees, 7 thousand US gallons (26 m3) of water, 3 cubic yards (2.3 m3) of landfill space, 2 barrels of oil (84 US gal or 320 l), and 4,100 kilowatt-hours (15 GJ) of electricity — enough energy to power the average American home for