This list depicts several items that are internal

Info icon This preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
This list depicts several items that are internal security matters, specifically items number two, four, and five.
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Number Seven: Pretend the problem will go away if they ignore it. Number Six: Authorize reactive, short-term fixes so problems re- emerge rapidly Number Five: Fail to realize how much money their information and organizational reputations are worth. Number Four: Rely primarily on a firewall. Number Three: Fail to deal with the operational aspects of security: make a few fixes and then not allow the follow through necessary to ensure the problems stay fixed Number Two: Fail to understand the relationship of information security to the business problem -- they understand physical security but do not see the consequences of poor information security. Number One: Assign untrained people to maintain security and provide neither the training nor the time to make it possible to do the job. The damage that is caused by these internal sources can be severe and can result in a loss of revenue. Network General notes that “the disgruntled worker with inside knowledge and adverse motives” poses a direct threat to the enterprise since “they have direct access to vital information” on the local network. Impact of internal threats can be limited to system abuse or extend to actual theft or damage. System abuse can include unlawful copying of copyright or licensed software, unauthorized access to computer files, employee use of computer equipment, or other non-business uses of corporate resources. More damaging impacts can be related to fraud. Employees can resort to theft of corporate data or actual systems. Loss of corporate data or transfer of company files can have a more distinct affect on the business than a physical disaster. System downtime as a result of an internal attack can have an adverse result on the enterprise and end users. The cost of the internal threat is tangible. Radcliff (1998, April) noted an excellent cost impact in an article on InfoWorld Electric. “Omega Engineering learned firsthand the dangers of the disgruntled employee after a timed virus, known as a logic bomb, wiped out all of its research, development, and production programs in one fell swoop. (The tape backup also was destroyed.) In January, charges were filed against 31-year-old Timothy Lloyd, an Omega programmer, for placing the bomb on the network, which detonated 10 days after his termination. Omega's costs will likely exceed $10 million as engineers and designers rewrite designs and recode programs.” There are ways to combat these internal threats. Some of the solutions are proactive while others are reactionary. Some of the techniques are similar to Internet security methods while some or pertinent only to internal threat reduction. The payback of implementing counter measures is obvious, to protect company resources which include data and systems. Internal security threats and issues can be broken into some logical
Image of page 2
categories for further exploration and discussion. These categories include the following topics: Security Policies System Administration Vulnerability Scanning
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern