Create a 2 pages page paper that discusses information system security of a company.

Create a 2 pages page paper that discusses information system security of a company. As companies increasingly focus on making changes to their security policies and enhancing security of their electronic resources and networks by using latest technologies, there is often a ‘weak link’ that they completely ignore. Kevin D. Mitnick, cofounder of Defensive Thinking (a Los Angeles-based information security firm) and a notorious former hacker, describes the measures companies should take against ‘social engineers’. According to the author, phones are the most dangerous tools that hackers use in stealing out information from an organization. Because of their skills in deceiving naïve people into revealing proprietary information, these hackers are termed as social engineers. They attempt to gain information by enticing people into simple gimmicks and taking advantage of the people’s trusting nature.Quoting an example of a real life case where a hacker manages to get a spyware installed on a Vice President’s PC, the author points out about the vulnerability of human beings and the ease at which any clever hacker can succeed. The hacker or social engineer first manages to get the contact number of a new employee from the HR department and then, pretending to be one of the vice presidents, he calls the employee and fools him into downloading a file on the actual VP’s computer. Of course this does require technical skills to create the malware files and a sufficient amount of information about the organization and its employees, but the core essence is the ability to sound genuine on the phone and trick the other person into believing you.This method is very dangerous and using such techniques, social engineers can easily gain control of company’s computers and telephone systems and pretending to be company’s employees, they can even access company’s confidential information such as customer lists and financial data.Given this threat and an example of how an attack is actually carried out, the author explains some of the measures that organizations can take to protect themselves. At the first step, the organization should have a complete security policy that also takes social engineering attacks into account. Every member of the organization should be made part of the security team and be involved in the process. It is important that all employees are made aware about social engineering and the techniques hackers use to carry it out. They should be continuously reminded to guard themselves and be motivated about it. A part of it would be to carry out exercises from time-to-time and send out security messages and reminders. As a further measure, employees should be rewarded for observing the security policy and be charged in case they violate it. However, despite all these, the most important technique is to make the employees realize that their personal data and confidential information is also at stake along with the organization’s data. Additionally, the organizations may also take help from professional security firms to diagnose weaknesses and devise policies.

Order a unique copy of this paper
(550 words)

Approximate price: $22

Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

We value our customers and so we ensure that what we do is 100% original..
With us you are guaranteed of quality work done by our qualified experts.Your information and everything that you do with us is kept completely confidential.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

The Product ordered is guaranteed to be original. Orders are checked by the most advanced anti-plagiarism software in the market to assure that the Product is 100% original. The Company has a zero tolerance policy for plagiarism.

Read more

Free-revision policy

The Free Revision policy is a courtesy service that the Company provides to help ensure Customer’s total satisfaction with the completed Order. To receive free revision the Company requires that the Customer provide the request within fourteen (14) days from the first completion date and within a period of thirty (30) days for dissertations.

Read more

Privacy policy

The Company is committed to protect the privacy of the Customer and it will never resell or share any of Customer’s personal information, including credit card data, with any third party. All the online transactions are processed through the secure and reliable online payment systems.

Read more

Fair-cooperation guarantee

By placing an order with us, you agree to the service we provide. We will endear to do all that it takes to deliver a comprehensive paper as per your requirements. We also count on your cooperation to ensure that we deliver on this mandate.

Read more

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages

Order your paper today and save 15% with the discount code HAPPY

error: Content is protected !!
Open chat
You can contact our live agent via WhatsApp! Via + 1 323 412 5597

Feel free to ask questions, clarifications, or discounts available when placing an order.