{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

EXAMPLE 1 SECURITY ASSIGNMENT

EXAMPLE 1 SECURITY ASSIGNMENT - 1 Executive summary.2 2...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
1 1. Executive summary…………………………………..…………………..2 2. Case…………………………………..…………………………………..3 3. Introduction………………………………………………………………4 4. Issue identified……………………………………………………………4-5 5. Analysis 5.1. Planning Security……………………………………………………….5 5.2. Contingency planning…………………………………………………..6 6. Information Security Policy and program policy ……………………….6-7 7. Program…………………………………………………………………..7-8 8. Assessing risk……………………………………………………………..8 9. Controlling risk……………………………………………………………9 10. Mechanisms used…………………………………………………………9 11. People and projects personnel……………………………………………10 12. Conclusion……………………………………………………………….10 13. Recommendations……………………………………………………… 11 14. Reference………………………………………………………………..12
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
2 1. Executive summary This report aims to identify the issue regarding the hacking of eBay’s Web Site and analyse eBay’s security policy, including their security planning; contingency planning; policy and program policy; program protection; assessing risk; controlling risk; mechanisms use and people and projects personnel. Also, it includes recommendations for eBay’s system which could help to avoid potential hacking in the future. Nowadays, technology has improved rapidly at the same times more and more security issues arise. It is not enough to prevent these issue by technology people in the organisation but every employee in the organisation have to aware of security and deal with those problems. How these issues can avoid is to have appropriate policy and implement the program and train the people. If eBay would have had better or suitable security planning, they could have avoided or at least reduced the damages. The solution needs a new security framework with a wide, generic protection from harmful attacks that ideally should be low cost and easy to implement and effectively protect the weak points of the organisation’s system. 2. Article: Hacker Cracks Ebay’s Web Site
Background image of page 2