Organizations face major privacy issues when it comes to working with employee and customers’ information. Customers often buy items online from stores and the store gives the option to store payment information and other customer private information such as names, address, phone number, login name, password, and other information the organization may require. The organization also keep employee files on the servers such as names, address, phone numbers, social security, and other information. Attackers try to get into organizations networks to steal this information which can be sold to others who use the information for identity theft. The threats to private information are malicious software such a viruses, keyloggers, man in the middle programs and more which could steal or forward private information. A Denial of Service attack (DoS) is another threat the privacy in that it can prevent other people from accessing a server while the attacker steal or damage information on the server. For an example, according to Schreiver (2011), the hack on PlayStation Network potentially leaves about 70 million people credit cards at risk, (Schreiver, 2011). Another threat to private information are employees ...
... middle of paper ...
...on security will help to mitigate the risks to private information.
Easttom, C. (2006). Network defense and countermeasures. (p. 78).
Upper Saddle River, NJ: Pearson Education, Inc.
Grama, A. (2011). Legal issues in information security. (p. 174).
Burlington, MA: Jones & Barlett Learning.
Lineberry, S. (2007, Nov). The human element: The weakest link in information security. Retrieved from http://www.journalofaccountancy.com/Issues/2007/Nov/TheHuman
Schreiver , J. (2011, april 25). Playstation network hack leaves credit card info at risk. Retrieved from http://www.wired.com/gamelife/2011/04/playstation-network-hacked/
Whitney, L. (2013, Dec 19). Target: Hack may have hit 40 million accounts. Retrieved from http://news.cnet.com/8301-1009_3-57616088-83/target-hack-may-have-hit-40-million-accounts/
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- "Security is mostly a superstition. It does not exist in nature. Life is either a daring adventure or nothing." -- Helen Keller Security has been a common topic of controversy since the terrorist attacks of September 11, 2001, and even before then it was a constant subject. The image of buildings collapsing and billowing smoke has been engraved into the minds of Americans and will remain there for years to come. Security is an issue that we encounter everyday. Whether it is driving down the freeway or walking into the grocery store; we are cautious of what is going on around us.... [tags: Security vs Privacy]
2936 words (8.4 pages)
- Businesses and people are using Internet for entertainment, e-business and e-commerce, social networking, and communication to the people and business, but there have always been threats to the Internet Security. Internet security is major concern in field of technology, because there are various personal, business and government data on the Internet. Today every businesses and organizations have their own security systems to reach their goals of information security. Internet security systems are created to reduce cyber attack risks, reliability, maintain confidentiality, and compliance with privacy laws and national security laws.... [tags: Security, Computer security, Internet]
962 words (2.7 pages)
- The internet, a powerful engine for growth and freedom, nations is, therefore, taking advantage of its enormous benefits. Since everything from military to systems to Smartphone-linked to the internet, however, bad actors are trying to steal from those targets has increased drastically. Hackers, compromise, take or destroy hundreds of billions of dollars in intellectual property and real money as well as assessing the critical military top secrecy from various nations, majorly the United States annually.... [tags: Security, Computer security, Privacy]
993 words (2.8 pages)
- ... For example, most of the information required to steal someones identity can be found on social networking sites that users are a part of. According to the RCMP, some of the information required for identity theft includes full name, date of birth, and address.  With the amount of private information being collected and shared across networks and their services, a need for protection of information begins to rise. About 68% of internet users' in America believe that the current laws that are in place are not good enough in protecting people's online privacy, according to a report on Anonymity, Privacy, and Security Online.... [tags: privacy on the web, growing concern]
960 words (2.7 pages)
- A number of high profile organisations have been subjected to great reputational damage resulting from a proliferation of personal information breaches (Protecting Personal Information, 2010). Organisations have made substantial use of their customer's personal information without doing much to protect the information. Organisation's collecting personal information have had little impetus to consider the best privacy protection solutions and people have not done anything drastic to initiate such action (Loss of privacy is price one pays to live in online world, 2011).... [tags: Personal Information, Privacy Law]
997 words (2.8 pages)
- SECURITY Concept of Security However, risk is the likelihood of something bad happening, security help to minimize risks. There is a need to recognize how risk can result from a threat. Some of the common threats are as follows: I. Unintentional threat—natural disasters like flood, fire or snow storms or equipment failure like power failure or network failure. II. Intentional threat---includes theft of laptops, software or data and fraud which translates to unauthorized access to data. In the world of IT, today there are different kinds of security risks.... [tags: Security, Computer security, Physical security]
1266 words (3.6 pages)
- As relates to the Issue of Information Security programs, the Department of Health and Human Sciences has formulated various different policies aimed at governing information handling and security as concerns all the departments’ resources. Common in the list of policies are the Policy on Information and Technology security for Remote Access which was established to ensure the information and technology departments resources are appropriately protected during the authorization of remote accessibility to the automated information and system of the department of human and health services.... [tags: Information security, Security, Confidentiality]
1094 words (3.1 pages)
- ... Unfortunately, this may also impose massive hardships by increasing the costs and labor for agencies to establish permissible access. However, this expected and justified expense comes with risk reduction. It is also worth noting that FISMA protects certain government information from being subjected to release by the Freedom of Information Act (FOIA) (Feinberg, 2004). GLBA repealed acts such as the Glass-Steagall Act of 1933 and the Bank Holding Company Act of 1965, which barred financial bodies from performing any mixture of roles such as banks delving into insurance underwriting, securities, and other investment functions (Mamun, Hassan, & Maroney, 2005).... [tags: information security, models, protection]
1683 words (4.8 pages)
- Choicepoint: A Case of Privacy in the 21st Century Introduction Since its founding in 1776, America has been a country where the rights of individuals are one of the most important issues. As time has passed and the country progressed, this issue has evolved and taken different forms; the Civil War was fought over whether people of all colors had the right to freedom, in the early 20th century women finally demanded their long overdue right to vote (Wikipedia, 2003), and most recently, in the 1960’s, people of color had to assert their right to equal treatment under the laws of this nation.... [tags: Capitalism Information Privacy Market]
1725 words (4.9 pages)
- Internet Security Internet Security is the most important aspect of information technology. It has been years since computer has been invented and to keep the information confidential we have to safeguard this information. The importance of integrating security measures into systems development. Every business has their own security systems to reach their goals of information security. The computer world created security systems in order to reduce risk, maintain confidentiality, ensure the reliability of data resources, and compliance with national security laws and privacy policies and laws.... [tags: Internet Privacy Security Web Essays]
1457 words (4.2 pages)