ISSC 471 IT Security: Auditing paper/outline

User Generated

QnqqlFunex

Writing

Description

Will need the topic in the next 48 hours.

You are required to write an 8-10 page research paper on a topic of your choosing, related to the course concepts. The annotated bibliography must include at least three of the references you will use in your paper, written in APA style, with each one followed by a brief description of the reference. To submit your assignments cut and paste any text into the Submission Text box, attachments are not available except for the research paper. This is for ease of grading on my part, Sakai does not handle attachments well.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hi, kindly find attached

Running Head: CYBER RISKS

1

Cyber Risks by Employees
Student’s Name
Institution
Date

SECURITY IN I.T

2

Introduction
The world we live in is one who has experienced a lot of redefinitions and revolutions in some
areas. One of those areas is the technological area, and it is only rational to say that a lot of
strides have been made in this area. It is also important to acknowledge the fact that even on
technological aspects like the internet, there still exists some risks. These risks can be termed as
cyber risks, and they come in some agents (International Conference on Information Technology
& Latifi, 2018).
This paper will aim to narrow down on how employees could be the very threat to cybersecurity
and confidentiality while at the same time underlining the fact that this could happen
intentionally or even unintentionally depending on the circumstances.
As mentioned in the introduction, the world we currently exist in is one which is run by a great
deal through the internet. This means that time, and again there can always be attacks on systems
because of either weak firewalls or even unintended carelessness on the side of the people who
are mandated to run these very systems.
One of the reasons as to why there have been a lot of cyber-attacks and hence looming cyber
risks even on systems belonging to the Homeland securities is because of the recklessness and
carelessness on the employees who are supposed to be running these systems (In Antipova, In
Rocha & International Conference on Information Technology Science, 2018).
Among many other ways, this is how employees could be the source of cyber risk to an entire
system;


Acting from inside



Having poor passwords

SECURITY IN I.T


The availability of weak access policies



Through unprotected downloads



Through Phishing and social engineering



Through unprotected data and emails.

3

All the points mentioned above will be discussed and in details in the next part of this paper in
order to shed more light on how the employees are working for a given organization, could be
the very source of insecurity to the Technological systems that are in place. At the same time, it
will also be made clear on all the related optics.
Acting from Inside
This is one of the main factors that has always made some employees to be the agents to cyber
insecurity in their organizations. This happens in the sense that employees who have access to
the most sensitive of information and data are contacted by hackers and malicious elements and
either convinced or coerced into being moles, not their organization.
When it so happens that the employee agrees to act in the interest of the malicious parties, they
may go a very long way to compromising the security of the systems belonging to the
organizations they work for and what this translate to is them being the loophole for cyber
insecurity at the end of the day (Communications Security Establishment (Canada) & Canadian
Centre for Cyber Security, 2018).
It is however of utmost importance to underline the fact that this factor can eit...


Anonymous
Goes above and beyond expectations!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags