SlideShare a Scribd company logo
Article1:
DISCUSSION_1
Information security within an organization could be easily
compromised once the access to information is given from
insiders or stolen from the outsider by any means possible.
Based on my experience as supervisors, managing a
supermarket, I was often met with similar situations as
described by the boss. Calls from individuals with presumable
made-up name claiming to be as vendors who would like to
supply their products to our supermarket, often turn into
conversations that are related to sensitive information relating
other vendors, their product, and price related questions.
Spam messages that have become identifiable normal email
communicate from vendors could also pose the great security
risk for the organization. According to Kaspersky, Spam emails
are sent out to the recipient for spreading malicious code onto
recipients’ computers and running phishing scams to obtain
sensitive data like password and financial information
(Kaspersky, 2018). From my previous experience, these emails
are usually the cause of computer breakdown and loss of
information in a couple of branches which had supervisors who
had little knowledge regarding computer and Spam will using
email.
As for people who have been seen searching company’s trash
dumpsters for recyclable containers, it is obvious that they
attempted to salvage any possible sensitive information from
the company.
In this case, the management should have met within the
company with employees who have direct access to company
sensitive information. Inform everyone of possible attempt to
breach information security and educate those who might have
little knowledge of email spam.
Disposable documents through recyclable dumpsters need to be
thoroughly managed to ensure that no possible information
could be gathered through the trash. And lastly, ensure that
employees understand their role regarding using and sharing
sensitive information via telephone calls, email and hard
documents to ensure information security in the company.
Below are methods an organization guarantees that its system is
ensured:
Install Anti-Virus Software:
Guarantee that legitimate hostile to infection programming is
introduced on all computers. This ought to incorporate all
servers, computers, and workstations. On the off chance that
workers utilize PCs at home for business utilize or to remotely
get to the system, these computers ought to likewise have
against virus programming introduced.
Ensure that the anti-virus software is up and coming:
Regular new PC viruses are being discharged and it is
fundamental that organizations are shielded from these
infections by keeping the counter infection programming a la
mode. On the off chance that conceivable, organizations should
take a gander at strategies whereby PCs that don't have the most
avant-garde hostile to infection programming introduced are not
permitted to interface with the system.
Employ a firewall to ensure systems:
As PC infections can spread by implies other than email, it is
imperative that undesirable activity is hindered from entering
the system by utilizing a firewall. For clients that utilization
PCs for business far from the assurance of the organization's
system, for example, home PCs or PCs, an individual firewall
ought to be introduced to guarantee the PC is ensured.
Filter all email movement:
All approaching and active email ought to be separated for PC
infections. This channel ought to preferably be at the edge of
the system to anticipate PC infections. Messages with certain
record connections regularly utilized by PC infections to spread
themselves, for example,EXE,COM and.SCR documents, ought
to likewise be kept from entering the system.
Article 2:
In my view all of these strange incidents were caused by social
engineering. The main objectives of social engineering are the
same as hacking .To get unauthorized access to system or
information submit misrepresentation, organize interruption,
modern reconnaissance, wholesale fraud, or essentially to
disrupt the framework or system. Run of the mill targets
incorporate phone organizations and voice-mail, enormous name
partnerships and budgetary establishments, military and
government offices, and doctor's facilities.
Social engineering can happen in two ways. One the physical
and the psychological. First we will focus on physical setting
for these attacks, the working environment, the telephone, your
trash, and even on-line, in the work environment, the hacker can
essentially stroll in the entryway, as in pictures. And pretend to
be a support laborer or advisor who can access the association.
At that point the gatecrasher swaggers through the workplace
until the point that he or she finds a couple of passwords lying
around and rises out of the working with adequate data to abuse
the system from home soon thereafter. Another technique to get
authentication information is to just simply remain there and
watch an employee type in his password.
Social Engineering by Phone
The most pervasive sort of social engineering is led by
telephone. A programmer will call up and emulate somebody in
a place of authority or pertinence and step by step pull data out
of the client. Help desk are especially inclined to this kind of
assault.
Dumpster Diving
Dumpster diving, also called as trashing, is another popular
method of social engineering. A colossal measure of data can be
gathered through organization dumpsters.
The LAN Times recorded the accompanying things as potential
security spills in our junk: "organization telephone directories,
authoritative diagrams, updates, organization strategy manuals,
timetables of gatherings, occasions and excursions, framework
manuals, printouts of touchy information or login names and
passwords, printouts of source code, plates and tapes,
organization letterhead and notice shapes, and obsolete
equipment." These sources can give a rich vein of data for the
programmer. Telephone directories can give the programmers
names and quantities of individuals to target and imitate.
Hierarchical diagrams contain data about individuals who are in
places of expert inside the association.
On-Line Social Engineering
The Internet is ripe ground for social designers hoping to
collect passwords. The essential shortcoming is that numerous
clients frequently put only same password on each different
account.
Prevention for social engineering:
· Prepare workers/help desk people to never give out
passwords or other secret information by telephone.
· Tight identification security, representative preparing, and
security officers show.
· Try not to type in passwords with any other person display
(or in the event that you should, do it rapidly
· Telephone (Help Desk) All workers ought to be doled
out a PIN particular to enable work area to help
· Keep all waste in secured, monitor area, shred critical
information, and delete attractive media.
PLEASE READ ABOVE 2 ARTICLES AND COMMENT WITH
150 WORDS ON EACH ARTICLE
PLASE WRITE IF YOU AGREE TO WHAT MENTIONED IN
THE ARTICLE AND WHY .

More Related Content

Similar to Article1DISCUSSION_1Information security within an organi

Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?
Web Werks Data Centers
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
larry1401
 
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
Anvesh Vision Private Limited
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
arnoldmeredith47041
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
The Lifesciences Magazine
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
Anne ndolo
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
AbdalrhmanTHassan
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103Jack McCullough
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
GFI Software
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
Aswani34
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
SibyJames1
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
CabdullhiY
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
EMC
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
CBIZ, Inc.
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
FitCEO, Inc. (FCI)
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
Skillmine Technology Consulting
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
Skillmine Technology Consulting
 

Similar to Article1DISCUSSION_1Information security within an organi (20)

Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
 
Puna 2015
Puna 2015Puna 2015
Puna 2015
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 

More from mallisonshavon

The objectives of this exercise are to1) Gain further experience .docx
The objectives of this exercise are to1) Gain further experience .docxThe objectives of this exercise are to1) Gain further experience .docx
The objectives of this exercise are to1) Gain further experience .docx
mallisonshavon
 
The objectives of this exercise are to1) Gain experience with usi.docx
The objectives of this exercise are to1) Gain experience with usi.docxThe objectives of this exercise are to1) Gain experience with usi.docx
The objectives of this exercise are to1) Gain experience with usi.docx
mallisonshavon
 
The objectives of this assignment are to1)Gain further unde.docx
The objectives of this assignment are to1)Gain further unde.docxThe objectives of this assignment are to1)Gain further unde.docx
The objectives of this assignment are to1)Gain further unde.docx
mallisonshavon
 
The Odyssey Discussion Activity - Guiding an Individual or Social.docx
The Odyssey Discussion Activity - Guiding an Individual or Social.docxThe Odyssey Discussion Activity - Guiding an Individual or Social.docx
The Odyssey Discussion Activity - Guiding an Individual or Social.docx
mallisonshavon
 
The objectives of this exercise are to1) Gain further experienc.docx
The objectives of this exercise are to1) Gain further experienc.docxThe objectives of this exercise are to1) Gain further experienc.docx
The objectives of this exercise are to1) Gain further experienc.docx
mallisonshavon
 
The objectives of this assignment are to1)Gain experience using.docx
The objectives of this assignment are to1)Gain experience using.docxThe objectives of this assignment are to1)Gain experience using.docx
The objectives of this assignment are to1)Gain experience using.docx
mallisonshavon
 
The objective of this weeks deliverable is to provide Robert M. Lop.docx
The objective of this weeks deliverable is to provide Robert M. Lop.docxThe objective of this weeks deliverable is to provide Robert M. Lop.docx
The objective of this weeks deliverable is to provide Robert M. Lop.docx
mallisonshavon
 
The number of American telecommuters is expected to increase by 29 m.docx
The number of American telecommuters is expected to increase by 29 m.docxThe number of American telecommuters is expected to increase by 29 m.docx
The number of American telecommuters is expected to increase by 29 m.docx
mallisonshavon
 
The number of children through adolescence with SED (severe and impa.docx
The number of children through adolescence with SED (severe and impa.docxThe number of children through adolescence with SED (severe and impa.docx
The number of children through adolescence with SED (severe and impa.docx
mallisonshavon
 
The NPR Analysis has a fivefold purpose. Experience National Publi.docx
The NPR Analysis has a fivefold purpose. Experience National Publi.docxThe NPR Analysis has a fivefold purpose. Experience National Publi.docx
The NPR Analysis has a fivefold purpose. Experience National Publi.docx
mallisonshavon
 
The normal curve is the shape that represents how variables are dist.docx
The normal curve is the shape that represents how variables are dist.docxThe normal curve is the shape that represents how variables are dist.docx
The normal curve is the shape that represents how variables are dist.docx
mallisonshavon
 
the nine properties of life. Briefly describe each of the nine prope.docx
the nine properties of life. Briefly describe each of the nine prope.docxthe nine properties of life. Briefly describe each of the nine prope.docx
the nine properties of life. Briefly describe each of the nine prope.docx
mallisonshavon
 
The NTSB frequently recommends safety improvements for the US airlin.docx
The NTSB frequently recommends safety improvements for the US airlin.docxThe NTSB frequently recommends safety improvements for the US airlin.docx
The NTSB frequently recommends safety improvements for the US airlin.docx
mallisonshavon
 
The nobleman Hugh of Lusignans account of his dealings with his lor.docx
The nobleman Hugh of Lusignans account of his dealings with his lor.docxThe nobleman Hugh of Lusignans account of his dealings with his lor.docx
The nobleman Hugh of Lusignans account of his dealings with his lor.docx
mallisonshavon
 
The National Association for the Education of Young Children (NAEYC).docx
The National Association for the Education of Young Children (NAEYC).docxThe National Association for the Education of Young Children (NAEYC).docx
The National Association for the Education of Young Children (NAEYC).docx
mallisonshavon
 
The movie I  chose is FIREPROOFi have attached the document with.docx
The movie I  chose is FIREPROOFi have attached the document with.docxThe movie I  chose is FIREPROOFi have attached the document with.docx
The movie I  chose is FIREPROOFi have attached the document with.docx
mallisonshavon
 
The Monroe Doctrine became one of the crucial foundations of America.docx
The Monroe Doctrine became one of the crucial foundations of America.docxThe Monroe Doctrine became one of the crucial foundations of America.docx
The Monroe Doctrine became one of the crucial foundations of America.docx
mallisonshavon
 
The Movie I would like to analyze is ____________________ .Your An.docx
The Movie I would like to analyze is ____________________ .Your An.docxThe Movie I would like to analyze is ____________________ .Your An.docx
The Movie I would like to analyze is ____________________ .Your An.docx
mallisonshavon
 
The motion picture industry is a competitive business. More than 50 .docx
The motion picture industry is a competitive business. More than 50 .docxThe motion picture industry is a competitive business. More than 50 .docx
The motion picture industry is a competitive business. More than 50 .docx
mallisonshavon
 
The Moore-Thomas, Day-Vines article explores cultural competence as .docx
The Moore-Thomas, Day-Vines article explores cultural competence as .docxThe Moore-Thomas, Day-Vines article explores cultural competence as .docx
The Moore-Thomas, Day-Vines article explores cultural competence as .docx
mallisonshavon
 

More from mallisonshavon (20)

The objectives of this exercise are to1) Gain further experience .docx
The objectives of this exercise are to1) Gain further experience .docxThe objectives of this exercise are to1) Gain further experience .docx
The objectives of this exercise are to1) Gain further experience .docx
 
The objectives of this exercise are to1) Gain experience with usi.docx
The objectives of this exercise are to1) Gain experience with usi.docxThe objectives of this exercise are to1) Gain experience with usi.docx
The objectives of this exercise are to1) Gain experience with usi.docx
 
The objectives of this assignment are to1)Gain further unde.docx
The objectives of this assignment are to1)Gain further unde.docxThe objectives of this assignment are to1)Gain further unde.docx
The objectives of this assignment are to1)Gain further unde.docx
 
The Odyssey Discussion Activity - Guiding an Individual or Social.docx
The Odyssey Discussion Activity - Guiding an Individual or Social.docxThe Odyssey Discussion Activity - Guiding an Individual or Social.docx
The Odyssey Discussion Activity - Guiding an Individual or Social.docx
 
The objectives of this exercise are to1) Gain further experienc.docx
The objectives of this exercise are to1) Gain further experienc.docxThe objectives of this exercise are to1) Gain further experienc.docx
The objectives of this exercise are to1) Gain further experienc.docx
 
The objectives of this assignment are to1)Gain experience using.docx
The objectives of this assignment are to1)Gain experience using.docxThe objectives of this assignment are to1)Gain experience using.docx
The objectives of this assignment are to1)Gain experience using.docx
 
The objective of this weeks deliverable is to provide Robert M. Lop.docx
The objective of this weeks deliverable is to provide Robert M. Lop.docxThe objective of this weeks deliverable is to provide Robert M. Lop.docx
The objective of this weeks deliverable is to provide Robert M. Lop.docx
 
The number of American telecommuters is expected to increase by 29 m.docx
The number of American telecommuters is expected to increase by 29 m.docxThe number of American telecommuters is expected to increase by 29 m.docx
The number of American telecommuters is expected to increase by 29 m.docx
 
The number of children through adolescence with SED (severe and impa.docx
The number of children through adolescence with SED (severe and impa.docxThe number of children through adolescence with SED (severe and impa.docx
The number of children through adolescence with SED (severe and impa.docx
 
The NPR Analysis has a fivefold purpose. Experience National Publi.docx
The NPR Analysis has a fivefold purpose. Experience National Publi.docxThe NPR Analysis has a fivefold purpose. Experience National Publi.docx
The NPR Analysis has a fivefold purpose. Experience National Publi.docx
 
The normal curve is the shape that represents how variables are dist.docx
The normal curve is the shape that represents how variables are dist.docxThe normal curve is the shape that represents how variables are dist.docx
The normal curve is the shape that represents how variables are dist.docx
 
the nine properties of life. Briefly describe each of the nine prope.docx
the nine properties of life. Briefly describe each of the nine prope.docxthe nine properties of life. Briefly describe each of the nine prope.docx
the nine properties of life. Briefly describe each of the nine prope.docx
 
The NTSB frequently recommends safety improvements for the US airlin.docx
The NTSB frequently recommends safety improvements for the US airlin.docxThe NTSB frequently recommends safety improvements for the US airlin.docx
The NTSB frequently recommends safety improvements for the US airlin.docx
 
The nobleman Hugh of Lusignans account of his dealings with his lor.docx
The nobleman Hugh of Lusignans account of his dealings with his lor.docxThe nobleman Hugh of Lusignans account of his dealings with his lor.docx
The nobleman Hugh of Lusignans account of his dealings with his lor.docx
 
The National Association for the Education of Young Children (NAEYC).docx
The National Association for the Education of Young Children (NAEYC).docxThe National Association for the Education of Young Children (NAEYC).docx
The National Association for the Education of Young Children (NAEYC).docx
 
The movie I  chose is FIREPROOFi have attached the document with.docx
The movie I  chose is FIREPROOFi have attached the document with.docxThe movie I  chose is FIREPROOFi have attached the document with.docx
The movie I  chose is FIREPROOFi have attached the document with.docx
 
The Monroe Doctrine became one of the crucial foundations of America.docx
The Monroe Doctrine became one of the crucial foundations of America.docxThe Monroe Doctrine became one of the crucial foundations of America.docx
The Monroe Doctrine became one of the crucial foundations of America.docx
 
The Movie I would like to analyze is ____________________ .Your An.docx
The Movie I would like to analyze is ____________________ .Your An.docxThe Movie I would like to analyze is ____________________ .Your An.docx
The Movie I would like to analyze is ____________________ .Your An.docx
 
The motion picture industry is a competitive business. More than 50 .docx
The motion picture industry is a competitive business. More than 50 .docxThe motion picture industry is a competitive business. More than 50 .docx
The motion picture industry is a competitive business. More than 50 .docx
 
The Moore-Thomas, Day-Vines article explores cultural competence as .docx
The Moore-Thomas, Day-Vines article explores cultural competence as .docxThe Moore-Thomas, Day-Vines article explores cultural competence as .docx
The Moore-Thomas, Day-Vines article explores cultural competence as .docx
 

Recently uploaded

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 

Recently uploaded (20)

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 

Article1DISCUSSION_1Information security within an organi

  • 1. Article1: DISCUSSION_1 Information security within an organization could be easily compromised once the access to information is given from insiders or stolen from the outsider by any means possible. Based on my experience as supervisors, managing a supermarket, I was often met with similar situations as described by the boss. Calls from individuals with presumable made-up name claiming to be as vendors who would like to supply their products to our supermarket, often turn into conversations that are related to sensitive information relating other vendors, their product, and price related questions. Spam messages that have become identifiable normal email communicate from vendors could also pose the great security risk for the organization. According to Kaspersky, Spam emails are sent out to the recipient for spreading malicious code onto recipients’ computers and running phishing scams to obtain sensitive data like password and financial information (Kaspersky, 2018). From my previous experience, these emails are usually the cause of computer breakdown and loss of information in a couple of branches which had supervisors who had little knowledge regarding computer and Spam will using email. As for people who have been seen searching company’s trash dumpsters for recyclable containers, it is obvious that they attempted to salvage any possible sensitive information from the company. In this case, the management should have met within the company with employees who have direct access to company
  • 2. sensitive information. Inform everyone of possible attempt to breach information security and educate those who might have little knowledge of email spam. Disposable documents through recyclable dumpsters need to be thoroughly managed to ensure that no possible information could be gathered through the trash. And lastly, ensure that employees understand their role regarding using and sharing sensitive information via telephone calls, email and hard documents to ensure information security in the company. Below are methods an organization guarantees that its system is ensured: Install Anti-Virus Software: Guarantee that legitimate hostile to infection programming is introduced on all computers. This ought to incorporate all servers, computers, and workstations. On the off chance that workers utilize PCs at home for business utilize or to remotely get to the system, these computers ought to likewise have against virus programming introduced. Ensure that the anti-virus software is up and coming: Regular new PC viruses are being discharged and it is fundamental that organizations are shielded from these infections by keeping the counter infection programming a la mode. On the off chance that conceivable, organizations should take a gander at strategies whereby PCs that don't have the most avant-garde hostile to infection programming introduced are not permitted to interface with the system. Employ a firewall to ensure systems: As PC infections can spread by implies other than email, it is
  • 3. imperative that undesirable activity is hindered from entering the system by utilizing a firewall. For clients that utilization PCs for business far from the assurance of the organization's system, for example, home PCs or PCs, an individual firewall ought to be introduced to guarantee the PC is ensured. Filter all email movement: All approaching and active email ought to be separated for PC infections. This channel ought to preferably be at the edge of the system to anticipate PC infections. Messages with certain record connections regularly utilized by PC infections to spread themselves, for example,EXE,COM and.SCR documents, ought to likewise be kept from entering the system. Article 2: In my view all of these strange incidents were caused by social engineering. The main objectives of social engineering are the same as hacking .To get unauthorized access to system or information submit misrepresentation, organize interruption, modern reconnaissance, wholesale fraud, or essentially to disrupt the framework or system. Run of the mill targets incorporate phone organizations and voice-mail, enormous name partnerships and budgetary establishments, military and government offices, and doctor's facilities. Social engineering can happen in two ways. One the physical and the psychological. First we will focus on physical setting for these attacks, the working environment, the telephone, your trash, and even on-line, in the work environment, the hacker can essentially stroll in the entryway, as in pictures. And pretend to be a support laborer or advisor who can access the association. At that point the gatecrasher swaggers through the workplace until the point that he or she finds a couple of passwords lying
  • 4. around and rises out of the working with adequate data to abuse the system from home soon thereafter. Another technique to get authentication information is to just simply remain there and watch an employee type in his password. Social Engineering by Phone The most pervasive sort of social engineering is led by telephone. A programmer will call up and emulate somebody in a place of authority or pertinence and step by step pull data out of the client. Help desk are especially inclined to this kind of assault. Dumpster Diving Dumpster diving, also called as trashing, is another popular method of social engineering. A colossal measure of data can be gathered through organization dumpsters. The LAN Times recorded the accompanying things as potential security spills in our junk: "organization telephone directories, authoritative diagrams, updates, organization strategy manuals, timetables of gatherings, occasions and excursions, framework manuals, printouts of touchy information or login names and passwords, printouts of source code, plates and tapes, organization letterhead and notice shapes, and obsolete equipment." These sources can give a rich vein of data for the programmer. Telephone directories can give the programmers names and quantities of individuals to target and imitate. Hierarchical diagrams contain data about individuals who are in places of expert inside the association. On-Line Social Engineering The Internet is ripe ground for social designers hoping to collect passwords. The essential shortcoming is that numerous
  • 5. clients frequently put only same password on each different account. Prevention for social engineering: · Prepare workers/help desk people to never give out passwords or other secret information by telephone. · Tight identification security, representative preparing, and security officers show. · Try not to type in passwords with any other person display (or in the event that you should, do it rapidly · Telephone (Help Desk) All workers ought to be doled out a PIN particular to enable work area to help · Keep all waste in secured, monitor area, shred critical information, and delete attractive media. PLEASE READ ABOVE 2 ARTICLES AND COMMENT WITH 150 WORDS ON EACH ARTICLE PLASE WRITE IF YOU AGREE TO WHAT MENTIONED IN THE ARTICLE AND WHY .