Saturday, February 15, 2020

IT 4076 Evaluation and Risk Assessment Research Paper

IT 4076 Evaluation and Risk Assessment - Research Paper Example All organizations are exposed to threats and vulnerabilities that have adversarial impacts on the companies’ operations. Information security professionals have the responsibility of helping the organizations’ management boards to comprehend and control these uncertainties. Threats Threats are the sources and means of particular types of attacks. Threat analysis enables information security experts to determine the most appropriate approaches of securing systems against systems attacks. Security professionals perform penetration-testing exercises to identify threat profiles, develop effective countermeasures against threats and mitigate all earlier signs of threats (Kaiya, Sakai, Ogata & Kaijiri, 2013). The primary focus of threat analysis should be on analyzing the resources of the attackers. It is crucial for all organizations to analyze threats to help them develop specific security policies, which they can implement together with policy priorities and comprehend imp lementation needs for securing organizational resources. Information security threats include accidental disclosure, alteration of software, electrical disruption, acts of nature, and telecommunication malfunction. Vulnerabilities Vulnerabilities are the security flaws that allow a threat attack to be successful in a system. Corporate organizations and private businesses should do vulnerability testing to resolve the vulnerabilities and provide data required to identify unexpected perils to information security. The management boards should realize that such vulnerabilities do not particularly belong to technology class, but also apply to social factors, for example, personal authentication and authorization policies. Vulnerability testing is of paramount importance in maintaining ongoing security and allows the professional responsible for security of the company’s resources to respond to new dangers as they arise (Kevin, Hackney & Edgar, 2010). Testing for vulnerabilities i s also invaluable in developing policy and technology and as part of the technology selection process. It is crucial for buyers to do effective vulnerability tests in order to select the right technology that can save time, money and other costs of business operations. My Encounter with an Information Security Threat I am the Managing Director a telecommunication company that offers postpaid communication services to the residents of Silicon Valley. Recently, I have realized that the costs of making calls were increasing abnormally among the callers. I communicated to my customers and requested from them some information concerning their communication expenditures. I found out that my customers were not really consuming these huge amounts of airtime to make calls. The information security professional made a follow-up and found out that there was massive phreaking and eavesdropping. Hackers were stealing services and using them while passing the costs of making calls to my customers . It was also found that these hackers had stolen credentials and contact information of my customers, which allowed them to control their voice calls, calling plans, billing information and call forwarding. Information is the cornerstone of the company, and its security is of paramount i

Sunday, February 2, 2020

World War II in American Scenario Essay Example | Topics and Well Written Essays - 1000 words

World War II in American Scenario - Essay Example Before the war, the American women primarily played the role of as housewives and mothers to the children. However, that changed after the initiation of the World War II, as the women folk were encouraged to join the industries and importantly even in the war efforts. This was pointed out by Quintile who states â€Å"The American Propaganda of 1941-1945 was aimed at persuading American Women to become involved in supporting the war effort, encouraging them to fill roles previously filled by men.† Thus various propaganda and continual appeals were issued from the American Government throughout the war to trigger the patriotic feeling among the women and to get their attention. Most of the propaganda aimed at the women during the World War II was three fold and that included the following. Firstly, they were done to fill the vacancies in the production area, which was caused by the departure of men from the workforce into the armed forces. Secondly, the other main aim of the pro paganda includes involving the women folk in the armed forces to fill up the desk activities and other roles such as the medical practitioners, nurses, civilians, chaplains, etc. Lastly actively support the armed forces by joining the troops in combative environments. Thus the government mainly focused on coming up with various approaches to make the American women contribute to the nation in a variety of ways. In that direction, the armed forces launched crash recruiting programmes such as conducting rallies, advertising campaigns, and other community outreach programmes to invite the female youth and women in other age groups. The War department publicists also produced huge posters that portrayed women in uniforms so as to make them involved in the armed forces. They particularly used the movie, ‘the Rosie the Riveter’, which depicted the life story of a woman who worked in the plane factory during World War II, as a publicity campaign to enroll more women into the a rmy. Even before the war, men were considered as the breadwinners who need to work outside the homes, while the women’s role was ‘contained’ within the confines of the house. The scene changed completely with the commencement of the Second World War. With respect to the increase in the demand of the military needs, the government decided to utilize the women folk in noncombatant and auxiliary military forces. As said above, women took over the traditional women’s work such as secretarial duties and other desk work inside the military operations. In 1942, US government â€Å"instituted the Women's Auxiliary Army Corps, later upgraded to the Women's Army Corps, which had full military status† and the female members of it, â€Å"known as WACs, worked in more than 200 non-combatant jobs stateside and in every theater of the war.† (â€Å"American Women in World War II.†). Then, women were efficiently used in support functions such as nurses , physicians, etc. The nurses from these groups sprang to the war front and they attended to the wounded soldiers. Also some of the nurses became Red Cross nurses and some served in the military nursing units. Moreover the cadet nurse crops recruited nursing students to work in military and other critical care facilities while they were in school. The cadet nurses and the medical practitioners joined the army to render critical nursing services to the wounded soldiers. They visited many military camps and attended to the needs of the soldiers apart from supplying with critical care medicines and other medical accessories to the camp. . Apart from non-combative roles, women also played active roles in the armed force