logo

Information Systems Security

   

Added on  2023-04-20

10 Pages2298 Words439 Views
Political Science
 | 
 | 
 | 
Running head: INFORMATION SYSTEMS SECURITY
INFORMATION SYSTEMS SECURITY
Name of the student:
Name of the university:
Author note:
Information Systems Security_1

1INFORMATION SYSTEMS SECURITY
Table of Contents
Introduction:....................................................................................................................................2
Discussion:.......................................................................................................................................2
Investigation to uncover the culprit:................................................................................................2
Recommendation of security policies to prevent the security issues in the future:.........................4
Legal, ethical and societal issues are involved with the hack:........................................................5
Legal issues:.................................................................................................................................5
Ethical issues:..............................................................................................................................5
Societal issues:.............................................................................................................................6
Conclusion:......................................................................................................................................7
References:......................................................................................................................................8
Information Systems Security_2

2INFORMATION SYSTEMS SECURITY
Introduction:
Information security is one of the biggest challenges in most of the organizations in
today’s world. There are different kind of issues that the organizations face in terms of data
security. Some of the most known issues are threat to data security, virus infections on the
systems due to accessing unknown websites, phishing attacks from spam emails, intrusion to
organizational data privacy from hackers through Trojan viruses, acts of employee vandalism
etc. These issues often lead to huge economic losses for the organizations.
The following report will highlight the case study of a particular secondary school, which
has faced similar security issues in the recent past since the login credentials of the school’s data
bases has been published on the internet. Since then there have been discrepancies in the grades
of the students, which in turn also affected the promotion rounds of many of them (MacAllister,
Macleod and Pirrie 2013). The legal, ethical as well as the societal issues will be discussed along
with data security recommendations that will be discussed in the following paragraphs.
Discussion:
Investigation to uncover the culprit:
The main point of investigation lies in the fact that there is a strict access control to the
admin office and it is mandatory for admin staff, cleaners as well as the principal to get their
access verified at the times of entering the admin office. They are the only people allowed in the
office. Only the administrative stuff have access to the databases credentials, which are
encrypted under the public keys of each admin staff with a GPG encryption version of 1.4.15.
These encrypted credentials are stored in a FTP transfer, which is openly accessible to all,
including the students. The level of technical knowledge and expertise of the students as
Information Systems Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ACCT6001 Accounting Information Systems Assignment
|5
|610
|92

Ethics and Sustainability in Information Technology and International Business
|9
|2478
|86

Risk Management Assessment 2022
|7
|1151
|21

Security Threats in Cloud Computing
|4
|668
|210

What is Information Technology? Definition and Examples
|12
|3523
|18

Ethical Hacking: Methodology, Tools and Penetration Testing
|17
|1703
|348