Protecting People and Information: Threats Research Paper

Pages: 5 (1483 words)  ·  Bibliography Sources: 3  ·  File: .docx  ·  Level: College Junior  ·  Topic: Education - Computers

The attackers use disguises to access systems. For example, they act as if they are helpdesk workers or machine repair technicians and easily gain access of passwords by deceiving the owners. Sometimes, the attackers correctly guess the usernames and passwords and thus gain access to systems for exploitation (Andress, 2003, p. 9).

Data can be easily stolen from a target by using Information Theft Attacks. Configuration errors in a system make it easy for an attacker to steal the valuable information out of a system. Thus, such attacks do not need to be supported by accessing target's systems (Andress, 2003, p. 9). The first step in an intrusion attack is the information theft attack that assists an attacker to research identifiable exploits and weaknesses of a particularly targeted server (Andress, 2003, p. 10).

To ensure security of valuable information, it is also required to be aware of the different kinds of attackers who can cause tremendous harm to the intangible assets. Hackers, Crackers, Script Kiddies, Malicious Insiders and Industrial Espionage are the various kinds of attackers who accomplish attacks. It is also to be remembered that people in any security infrastructure can turn out to be the weakest link (Andress, 2003, p. 5).

SafeguardsBuy full Download Microsoft Word File paper
for $19.77

Research Paper on Protecting People and Information: Threats Assignment

Today, masses can access the information together with security information as the Internet usage has increased extensively. It is now possible for anyone to see any other system as Internet is a network for general public. This was not considered as a big issue previously when the Internet was introduced as sensitive information couldn't be accessed without difficulty. However, as increased access to information has been allowed by the companies now-a-days, attackers find it uncomplicated to access the sensitive information with little efforts (Andress, 2003, p. 2). Thus, it is important that information assets must be protected. The first step should be the regular checking of the employees especially the ones who are responsible for handling record and information. Secondly, it is imperative to scrutinize that which record is sensitive. Also, it must be found out that who is after the information and what could be done to stop the data theft. Last but not the least, information security programs must be implemented in order to safeguard the valuable information (Hill & Pemberton, 1995).

Following are some precautions that could be beneficial in safeguarding the information and people from any malicious cyber criminal attack:

Protecting desktops and laptops against viruses by installing an advanced software

Setting up a firewall

Using encryption

Setting permissions

Installing pop-up blockers as pop-ups and animation can be dangerous for the system

Protecting important business data by executing a regular backup

Setting rules and regulations to ensure safe Internet usage

Safeguarding the network especially wireless network by monitoring remote access closely. This can be done by setting strong passwords ("Cyber Criminals Are Hunting," 2006, p. 31)

Building a security-conscious atmosphere in the organization by educating the employees about security threats and safeguards

Making sure that the programmers know the secure ways of coding (Andress, 2003, p. 6)

Access to restricted records must be authorized to the related personnel

Passwords must be six-characters long and be changed on a regular basis. It is also imperative not to share one's password even with a trustworthy individual

User terminals must not be left unattended especially when the system is logged on (Hill & Pemberton, 1995)


Every organization needs information security as it has become a major component for the continued survival. Information of and regarding an organization is the most valuable asset and this fact is to be inculcated in all the employees' minds. It is the duty of the management to educate the employees about proprietary information and its handling. Simple policies and procedures can be really helpful in protecting valuable information, if followed. Thus, it must be kept in mind that the best time to consider information security as a serious issue is 'right now' (Hill & Pemberton, 1995).


Andress, A. (2003). Surviving Security: How to Integrate People, Process, and Technology (2nd ed.). Boca Raton, FL: Auerbach. Retrieved November 11, 2011, from Questia database:

Cyber Criminals Are Hunting Your Data, So Lock Them Out. (2006, February 25). Western Mail (Cardiff, Wales), p. 31. Retrieved November 11, 2011, from Questia database:

Hill, L.B., & Pemberton, J.M. (1995, January). Information Security: an Overview and Resource Guide for Inf.… [END OF PREVIEW] . . . READ MORE

Two Ordering Options:

Which Option Should I Choose?
1.  Buy full paper (5 pages)Download Microsoft Word File

Download the perfectly formatted MS Word file!

- or -

2.  Write a NEW paper for me!✍🏻

We'll follow your exact instructions!
Chat with the writer 24/7.

Information Technology's Impact on Quality of Life Research Paper

Protecting the Community From Sex Offenders Few Thesis

Threat Assessment Essay

Information Technology a Home Network Essay

People Chip Essay

View 200+ other related papers  >>

How to Cite "Protecting People and Information: Threats" Research Paper in a Bibliography:

APA Style

Protecting People and Information: Threats.  (2011, November 12).  Retrieved September 28, 2020, from

MLA Format

"Protecting People and Information: Threats."  12 November 2011.  Web.  28 September 2020. <>.

Chicago Style

"Protecting People and Information: Threats."  November 12, 2011.  Accessed September 28, 2020.