Question

In: Operations Management

First, define the concept of security in the digital age. ( 150 words ) Second, imagine...

First, define the concept of security in the digital age. ( 150 words )

Second, imagine that you manage the customer-service department at the local utility (provider of electricity and natural gas). Name at least three specific measures that your department could take to prevent security breaches on the Internet. ( 150 words )

Solutions

Expert Solution

Security is one of the main concern when it comes to digitisation. Even though digitisation has made work easy there are security threats also. When we say about security it means protection against threats. In today's world cyber security threats are increasing at a rapid rate and for the same reason companies have developed softwares to protect oneself such threats. Such softwares not only gives us data protection but also protects us from various virus attacks which can hamper our work or say privacy. US is one such country where we have a lot of internet users therefore, we need to know about security threats. Basically Cyber threats can be of two types : A) Threat against individuals B) Threat against corporates. Now when it comes to variation it can be divided as : malicious codes, network abuses as well as network attacks. Malicious codes include : worms, spyware , trojans etc . Network abuses include phishing, Spam, network related frogery etc.Network attacks include DoS attacks, web defacement, intrusions etc.One must be more cautious against such threats and yes must be aware to recognise one such. Such threats when committed are categorized are cyber crimes .

Imagining if i am in one of departmental store and am a customer care specialist. I would take the below 3 measures to prevent against internet threats.

A) Anti- virus software : First of all , i would recommend purchase of anti - virus software which protect against such viruses, trogans etc.

B) Firewall : Secondly , approve firewall protection in my nnetwork as well as computer. This will prevent unauthorized access from any unknown network. I will do hardware as well software firewall protection.

C) Strong Passwords: I will also ensure to make use of strong passwords. I will keep in mind the password rules while setting password. i wont set my name, personal details as passwords.

D) Anti- Malware Software : I will also make sure malware protection is there on my system . This will protect from malicious software or program avilable online.

These are the basic things i would do in order to protect my department against cyber attacks.


Related Solutions

please respond with at least 150 words. 1. The digital age has changed the way music...
please respond with at least 150 words. 1. The digital age has changed the way music is both created and marketed. Long gone are the days hanging out in a record store to purchase vinyl. With Apple Music, my kids can yell "Hey Siri", from the back of the car and ask her to play practically any song available and it will. So, the question becomes: How do musicians cope with the new market structures in today's digital age? Could...
Q10. Describe the concept of the digital signature? What are the security properties that can be...
Q10. Describe the concept of the digital signature? What are the security properties that can be gained when using digital signature? Q11. Describe the concept of the message authentication code. Why it cannot be used to provide the property non-repudiation. Q12. In RSA algorithm, what is the relationship between the private key d and the value e from the public key? Explain the condition that must be held when finding the value e. Q13. Why authentication based on symmetric keys...
Define the following terms: globalization, the digital economy, and the information age.
Define the following terms: globalization, the digital economy, and the information age.
Define the six factors that determine the nominal interest rate on a security. Define the concept...
Define the six factors that determine the nominal interest rate on a security. Define the concept of term structure of interest rates. What are three theories that explain the future yield curve of interest rates?
150 to 200 words This week, our discussion will focus on the concept of stare decisis...
150 to 200 words This week, our discussion will focus on the concept of stare decisis and the landmark decision of Roe v. Wade. 1 -If your last name starts with the letters A - K, draft arguments that Roe v. Wade is settled law under the concept of stare decisis.
(150 words total) 1.1 The Second Industrial Revolution seemed to bring America to the forefront of...
(150 words total) 1.1 The Second Industrial Revolution seemed to bring America to the forefront of the world economically, but it had its downsides. What were they? 1.2 Did any of these downsides lead to the Great Depression? Explain. 1.3 The Second Industrial Revolution marked a shift from manufacturing to service-based industries. How did the New Deal affect this shift? 1.4 Comment on the extent to which F. Roosevelt's personality affected the course of the New Deal.
Information Technology (IT) Security Define your chosen type of security in your own words. Does the...
Information Technology (IT) Security Define your chosen type of security in your own words. Does the term shrinkage relate to your type of security? If so, how? (If not, please omit this portion from your response.) What challenges and risks exist for this type of security? How are the risks mitigated? Tracked? Eliminated? What types of internal and external factors exist? What key strategies are used to protect assets, personnel, and infrastructure? Please be sure to outline prevention and response...
Describe essential items in a.NET security guidelines in 150-200 words. Use Microsoft .NET security page, OWASP...
Describe essential items in a.NET security guidelines in 150-200 words. Use Microsoft .NET security page, OWASP GitHub page, and any other authoritative resources you find.
First, explain the concept of a Maturity Risk premium for bonds. Second, in terms of risk,...
First, explain the concept of a Maturity Risk premium for bonds. Second, in terms of risk, what is the “big takeaway” from this concept?
Imagine this is your first day as Senior Chief Information Security Officer (CISO) of Company A....
Imagine this is your first day as Senior Chief Information Security Officer (CISO) of Company A. The Chief Financial Officer (CFO) calls you wondering what should have been done differently during a recent incident involving your predecessor. The following incidents recently occurred and were closed out without any alert to senior staff or the CFO. The Chief Financial Officer’s admin reported that their laptops were performing erratically and many popup screens kept appearing while browsing the Internet. Upon inspection, it...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT