Here is the synopsis of our sample research paper on MANAGEMENT, SECURITY AND INFORMATION TECHNOLOGY. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 4-page paper details security issues that may be of concern for an IT manager. Bibliography lists 2 sources.
Page Count:
4 pages (~225 words per page)
File: AS43_MTmanasecu.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
particular area. The area chosen is information technology, as the security issues on protecting information tend to be fairly large and need to be addressed by the head of IT.
The nightmare of almost every company is that its security system has been breached and hackers have made off with important data (like
credit card or social security numbers). Such news doesnt instill confidence in consumers that their private information is being cared for properly. But
it isnt just the banks and public companies that can suffer from security breaches. Almost any company is at risk for a security breach, with hackers finding various holes in
a particular network to exploit. One thing to keep in mind as a security head in any company is that the hacker
profile has changed. Hackers were once independent workers (generally termed "computer nerds") who would hack into accounts for the fun of it. These days, however, hackers are bonafide criminals who
hack into security systems not for fun, but for profit. Steward, in 2007, wrote a "top ten" of how hackers breach security. These are stealing passwords, Trojan horses, exploiting defaults,
man-in-the-middle attacks, wireless attacks, hackers doing their homework, monitoring vulnerability research, being persistent/patient, confidence games, and an employee already on the inside (Steward, 2007).
Ironically enough, many of these "breaches" are actually caused by humans within the company. For example, stealing passwords is easy enough, even in password-only authentication systems. Steward notes
that people who use the same password on multiple accounts (especially if those accounts are public); people who write their passwords down and store them in obvious places - like
...