Computer Technology and Information Security Issues

User Generated

Obreobry

Writing

Description

Computer Technology and Information Security Issues

Write a 3-4 page double spaced paper answering the following questions:

1) Discuss the vulnerabilities unique to corporate computer systems/networks?

2) What tactics are used by hackers to break into corporate computer systems/networks?

3) Discuss the precautions that companies need to take to combat computer hackers?

4) What are some management principles basic to computer security in the workplace?

Make sure to use credible sources cited properly and listed in a Reference page.

A Title page with the Certificate of Authorship, an example of which is included in the Course Format Guide (located in the Announcement forum), must accompany the work submitted.

Unformatted Attachment Preview

COURSE FORMAT GUIDE APA’S RULES AND GUIDELINES (AS ADAPTED FOR WEBSTER UNIVERSITY’S SECR COURSES) 1. LABELING YOUR WORK: Please be sure to put your name on the first page of every assignment. You don’t need a cover sheet except for the term paper and the exams, but I do need your name. Points will be deducted for not putting your name on your assignment work. 2. MARGINS 1 inch on all sides. The page numbers and headers will violate the top margin (do not use the page number as the 1-inch guide). 3. JUSTIFICATIONS Justify the LEFT margin but have RAGGED RIGHTS. 4. SPACING Double space everything. Use two spaces after a period. Use Times New Roman, 12-point font. 5. PARAGRAPHS New paragraphs should be indented 5 spaces. Do not use a “double double-space” between paragraphs 6. PAGE NUMBER Upper RIGHT CORNER, Arabic numbers and begins 1 on title page (DO NOT SHOW) and number consecutively. 7. TITLE PAGE Term papers will require a title page. The title should summarize the main idea of the paper. The title of the paper may contain up to twenty words. If a number is part of the title, it should be spelled out. The author’s name and institution along with the course title, instructor, and date the paper is due should be included in the title page. Your cover sheets for the term paper and the examination require a Certificate of Authorship. Sample title pages follows at the end of the format guide. 8. ABSTRACT You must provide an Abstract for your Term Paper. This is a summary of the paper, not to exceed one-page. It is placed immediately following the Title Page and before the Table of Contents. 9. TABLE OF CONTENTS Term papers require a TABLE OF CONTENTS. All level one and two headings should be included. If other levels are used, include them. Sections that appear prior to the TABLE OF CONTENTS (Title Page and Abstracts) should not be included. Page numbers should be indicated. A sample Table of Contents is also included with this guide. 10. HEADINGS Headings indicate the organization of a paper, report or manuscript and establish the importance of each topic. Not every paper or report requires all levels of headings. Note: each subheading must have at least one counterpart at the same level within a section. Level 1 ALL CAPITALS, BOLD TEXT and centered Level 2 Mixed case and centered Level 3 Mixed case, underline, and centered Level 4 Mixed case, underline, and flush left 11. ORPHANS & WIDOW LINES When the first line of a paragraph appears as the last line on a page, it is referred to as an “orphan.” To avoid this, move the line into the next page creating a wider bottom margin. When the last line of a paragraph appears as the first line on a page, it is referred to as a “widow.” To avoid this, move at least one line of text from the previous page. 12. CITATIONS IN THE TEXT The APA format does not use footnotes at the bottom of the page, but it used citation within the text instead. When you use the author’s name in the text, do not repeat it in the reference. Position the reference next to the author’s name. Example: Brookfield (1986) identified several conditions that enhance the ability of adults to learn. When you are not using the author’s name in the text, supply it in the reference. Example: In a recent study of reaction times (Walker, 2000) or “The placebo effect has been verified in previous studies” (Miele, 1993, p.276). When a work has two authors always cite both names every time the reference occurs. Example: as Nightlinger and Littlewood (1993) demonstrated When a work has three, four, or five authors, cite all authors the first time the reference occurs, in subsequent citations; include only the surname of the first author followed by et al. Example: Wasserstein, Zappulla, Rosen, Gerstanam, and Rock (1994) found Example: Wasserstein et al. (1994) found Works with no author or with an anonymous author, cite in text the first few words of the reference list entry (usually the title) and the year. Use double quotations marks around the title of an article or chapter. Example: on free care (“Study Finds”, 1982) Italicize the title of the periodical, book, brochure, or report Example: the book College Bound Seniors (1979) 13. REFERENCES The Reference List at the end of the document provides the necessary information to identify and retrieve each source. This page should be labeled as the “Reference List”, not as a “Bibliography”. References cited in text must also appear in the Reference List; conversely, each entry in the Reference List must be cited in the text. Only sources cited within the text should be included in the Reference List. Arrange entries in alphabetical order by the surname of the first author. Flush first line and indent the remaining lines. BOOKS Author(s) last name, first name initial, period (.) 2 spaces, date of publication (2002), capitalize only the first word of the title and of the subtitle and italicize, edition (2nd ed.), period (.), city and state abbreviated (NM) of publication, semicolon (:), and publishing company. Example: Brookfield, S. D. (1986). Understanding and facilitating adult learning. San Francisco, CA: Jossey-Bass. Calfee, R., & Valencia, R. (2001). APA guide to preparing manuscripts for journal publication. Washington, DC: American Psychological Association Cleveland, W. (1994). Visualizing data. Summit, NJ: Hobart Press. Day, R. (1979). How to write and publish a scientific paper. Philadelphia, PA: ISI Press. JOURNALS AND PERIODICALS Italicize the journal or the periodical and include the date shown on the publicationmonth (2002, May), or give the volume number. Example: Boring, E. G. (1997, September). CP speaks. Contemporary Psychology, 2, 279. MAGAZINES Give the date shown on the publication month for monthlies or month and day for weeklies. Give the value number. Example: Raspberry, W. (1989, January 4). When “Black” becomes “African American.” The Washington Post, p. A19. NO AUTHOR Alphabetize works with no author by the first significant word in the title Example: The right to die. (1976, October 11). Time, 121, 101. 14. ELECTRONIC Direct readers as closely as possible to the information being cited and provide addresses that work. At minimum, a reference of an Internet source should provide a document title, a description and a date (either the date of publication or update of the date of retrieval and address (in Internet terms, a uniform resource locator, or URL). In an Internet periodical, volume and issue numbers often are not relevant. When ever possible, identify the authors of a document. Note there are no page numbers. Provide date (month/dav/vear) you retrieved the reference. Example: Argyis, C. & Schon, D. A. (2000). Theory in practice: Increase professional effectiveness. Retrieved June 2, 2002 from www.webster.edu. Crow, T. (2000). Did homo sapiens speciate on the y chromosome. Psychology Retrieved June 5, 2002 from ftp://ftp.princeton.edi/harnad.Psycoloquy/2000. 15. SECONDARY REFERENCES When referencing an author in a secondary work cite the original reference followed by “In” and then the reference. Example: Brookfield, S. D. (1986). Understanding and facilitating adult learning. San Francisco, CA: Jossey-Bass. In Hodgetts, R. M. (2002). Modern human relations at work (7th ed.). For Worth, TX: The Dryden Press. 16. PERSONAL COMMUNICATIONS Personal communications may be letters, electronic communications (e-mail), personal interviews, telephone conversations, and the like. Because they do not provide recoverable data, personal communications are not included in the reference list. Cite personal communications in text only. Example: L. Simson (personal communications, May 30, 2002). Sample Title Page (Term Paper): Impact of September 11, 2001 Terrorists Attacks on Security Operations in the United States Submitted by (Student Name) Prepared for Ken Gabel SECR 5000, Security Management Spring I Term 2019 Webster University (Date of Submittal) CERTIFICATE OF AUTHORSHIP: I certify that I am the author. I have cited all sources from which I used data, ideas, or words, either quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course. Sample Table of Contents: TABLE OF CONTENTS Abstract……………………………………………………………………. 1 Elementary and Secondary Schools…………………………………………3 School Security and Crisis Planning……………………………….. 3 Plan for Safety……………………………………………………… 3 Perimeter Security of Buildings and Surrounding Areas……………4 Preparedness Plan for Future Emergencies………………………… 5 Children Troubled by Terrorist Attacks……………………………. 6 Colleges and Universities……………………………………………………7 Effects on Foreign Students………………………………………… 8 Effects on American Students ……………………………………… 10 The Patriot Act ……………………………………………………… 12 Key Provisions of the Patriot Act …………………………… 12 Suggestions and Recommendations…………………………………………. 13 References…………………………………………………………………… 15 Sample Title Page (Examination (Mid-term or Final) and Assignments): Name (Mid-term or Final Examinations and Assignments) Submitted by Student Name Prepared for Ken Gabel SECR 5000, Security Management Spring I Term 2019 Webster University (Date of Submittal) CERTIFICATE OF AUTHORSHIP: I certify that I am the author of this examination/assignment. I also certify that this examination was written by me specifically for this course, with no assistance from any other individual.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

In case of any further edits, please do not hesitate to let me know! See you soon! Would appreciate to work with you in the future! Goodbye

Name
Institution
Date
Professor
Vulnerabilities in Corporate Computer Systems/Networks
Introduction: It is vital for organizations to understand the possible sources of computer systems
and network vulnerabilities to improve computer and network security.
I.

II.

III.

IV.

Vulnerabilities to corporate computer systems and networks
a. Bugs
b. Weak passwords
c. Missing data encryption
d. Missing authorizations
e. Download of internet materials without checking their integrities.
Tactics used by hackers
a. Denial of Service
b. Eavesdropping
c. Phishing
d. Trojan horse and virus
Precautions to combat hacking
a. Installing firewalls
b. Installing and ensuring that antivirus software is up to date
c. Use of strong passwords
d. Regular software updates
e. Use of two-factor authentication
Basic management principles for computer security
a. Integrity
b. Confidentiality
c. Availability


Vulnerabilities in Corporate Computer Systems/Networks
Submitted by
(Student Name)

Prepared for
Ken Gabel
SECR 5000, Security Management
Spring I Term 2019
Webster University
(Date of Submittal)

CERTIFICATE OF AUTHORSHIP: I certify that I am the author. I have cited all sources from
which I used data, ideas, or words, either quoted directly or paraphrased. I also certify that this
paper was prepared by me specifically for this course

2
VULNERABILITIES IN CORPORATE COMPUTER SYSTEMS/NETWORKS
In the current digital world, corporate computer and network security is a vital practice
that all organizations need to consider. There has been a general increase in computer literacy
and skills among people, and as a result, cybercrimes have been increasing at an alarming rate.
For this reason, organizations need to be more vigilant when handling computer and network
securities. It is vital for organizations to understand the possible sources of computer systems
and network vulnerabilities to improve computer and network security. There are several
vulnerabilities that are common to most organizations. These vulnerabilities include;
The first vulnerability is bugs. Bugs do happen to computer systems and other network
systems when these systems have faults, flaws or errors which make the systems not to behave in
a manner that is expected or to produce unexpected or incorrect results (Permann, Lee, Hammer
& Rhode, 2006). Another vulnerability is the use of weak passwords. It is normal for people in
organizations to secure their accounts, computer systems, and network devices as their first line
of defense. However, some people use weak passwords to secure their accounts and hackers can
easily bypass them and access the organization’s computer or network systems. Missing data
encryption is another vulnerability that is very common in the corporate computer or network
systems. It is essential for organizations to always encrypt both stored data and the data on transit
(Amanullah, Kalam & Zayegh, 2005). However, if an organization doesn't encrypt its...


Anonymous
This is great! Exactly what I wanted.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Content

Related Tags