Simplied Operations And Reduction of EffortoExplained Use: (Burnham, 2011)ointernal policy compliance by logging and proactively monitoring diverse information across the enterprise in real time, providing accountability, transparency and measurabilityoThey have become adept at finding the needle in the haystack, by correlating massive data volumes in real timeoWhen they applied flow-based network activity monitoring to the situation, they were able to quickly track down the data leakage and stop the employeeoAutomatically monitoring device configurations (e.g., firewalls) and alerting on policy violationsoPrioritizing the multitude of vulnerabilities reported by vulnerability scannersoPerforming predictive threat modeling and simulation of network changesoestimated risk reduction benefits of $13.5 million, the objective benefits (net of all solution costs) were estimated at $550,000Opposing Viewpoints and Alternatives: Page 4 of 6
BMAL 560oBiggest debate is over music and if it should be free to downloadoIf music was free it would reset consumer psychology, create new markets, break old ones, and make almost any product more attractive (Anderson, 2009)oSome believe security at the expense of privacy is un-American and unconstitutional (Konstantaras, 2003)oInvasion of privacy oFox comments that there should be a system where data is regarded as personal property and restrictions for authorities to check people's belongings (Lane & Cross, 2015)PROBLEMS:Stolen credit card informationIdentity theftPublic records are exposedNew hackers are constantly being bornAs technology grows and we become more dependent on technology for everything hackers increase and our privacy decreasesPERFORMANCE:(Lawrence & Weber, 2014, p. 291)Since 2007, The US and 27 European Countries gather annually for Data Privacy Day Website operators must now list all privacy policies even if it is located outside of the US “Perfect Citizen” program was established to detect cyber assaults specifically on electricity grid and nuclear powerplantsGovernment cannot act alone. Companies need to take action in addition to the government.Companies even competitors now are meeting together to discuss action toward cyber threatsHoneypot was established to lure hackers onto a fabricated website so that companies can track their every moveMany companies are also hiring hackers to work for their own company to locate their own security system weaknessesPUBLICATIONS:References Cited:Anderson, K (n.d.), "IT Security Professionals Must Evolve for Changing Market", SC Magazine, October 12, 2006.
You've reached the end of your free preview.
Want to read all 6 pages?