StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Organizational Security in the Internet - Essay Example

Cite this document
Summary
The paper "Organizational Security in the Internet" tells that businesses face higher risks because of the use of technology required for better living. It is combined with problems that arise with security risks with internal IT and other security threats that can cause a loss of data and options…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
Organizational Security in the Internet
Read Text Preview

Extract of sample "Organizational Security in the Internet"

Enhancing Internet Security in Organizations September 20, Introduction Changes within technology have also presented new complications for organizations because of the links that are needed for Internet applications. Currently, businesses are facing higher risks because of the use of technology that is required for better living. This is combined with problems that are beginning to arise with security risks with the internal IT as well as through other security threats that can cause a loss of data and options for those that are looking into new technology. Understanding what the threats are with the Internet and the way in which it is linked to organizational security and finding different alternatives to begin to secure organizations that are required to use technology and the Internet will also provide better solutions for those that are linked to IT. The security that is available for organizations, specifically which are required to use the Internet can then be enhanced to block and stop any of the problems that may occur on the Internet. By doing this, organizations can ensure safety of their data as well as of the main system that is being used for daily functioning. Ramifications on the Internet and Organizational Security The first major types of threats that are seen from the Internet and organizational security come from the internal environment and the way that end – users use technology. This can lead to data destruction as well as the inability to control the media and other downloads that come in from the Internet. For instance, many employees will accidently or purposely download or use a program on the Internet that will change the functioning of the IT systems within a given network. There have been several reports that show that employees who are upset over a situation will attack the organization’s database first as a malicious statement against the company. Viruses and other problems with the computers in the internal organization will then cause improper functioning. The result will be a loss in communication through emails, inability to share and collaborate through the office through options such as FTP and data that could be destroyed or damaged from the lack of security that is from the Internet. The main problems that occur are linked directly to the system use and the way in which it is handled through different employees within the company (Carr, Snyder and Bailey, 2010). The second major component that comes from the Internet that can threaten organizational security is applicable when one is linking to different sites and doesn’t have the correct amount of protection. While most Internet sites are secure, there are still threats from hackers that are trying to find ways to get into computer systems and to access information. Using basic portals is one of the simplistic ways to begin working with different systems to make sure that the Internet is able to move into a specific technology firm to access information. The Internet also provides portals for viruses, malware, adware and spyware. This can give an individual or company access to information about the company and will provide problems with the main aspects and components that are linked to breaking through security of an organization. With these different threats, the organization’s confidentiality can be broken and information can be accessed through individuals or other companies for data that is required. While firewalls are known to prevent the majority of this problem, hackers and specific types of viruses are known to compound the problem with more advanced technologies that continue to threaten the security on the Internet and through corporations (Cheswick, Bellovin, Rubin, 2003). The third problem linked to the Internet and security comes from businesses that are now building e- commerce portals and are using their business with online securities. The infrastructure and the control mechanisms that are on the Internet are required to be used correctly for the right implementation of the Internet. Procurement, deliveries and financial transactions are furthered with the amount of security that is needed both by end – users and within the organization. If a hacker or other company is able to break into the e-commerce portal, than it can cause a loss of finances and other applications, as well as data of other consumers. Having a secure area for the organization and ensuring that it is able to provide more functionality for those that want security on the Internet through upgrades in value added networks then becomes required for full functioning of the Internet. Organizations are now responsible for creating new portals of safety while moving into measures that are able to provide more opportunities for security among users and customers that are interested in the e – commerce of the business (Khosrowpour, 2004). Solutions to Security and the Internet The several problems that are linked to the Internet not only require to be reexamined for basic assistance, but new security levels should also be provided among organizations and technicians to enhance security. One of the options that is available is to begin restructuring different technical options for those that are using the Internet. This will prevent end users from having the ability to cause a loss of data or to change the data that is available through the internal environment. One of the most common options is to develop a protocol that offers security by end – user accessibility. A hierarchy is developed through this structure which only allows end – users to access one or two levels of information through the intranet while the other network areas are secured and only are used by managers and others that are using the computer system. For instance, having a different protocol for file transfers but not giving accessibility to the data that is behind this will prevent some of the problems from occurring and will prevent both employees and those that are outside of the system from moving into the organizational security layers and destroying information needed by the company (Carr et al, 2010). Other organizations are taking the basic component of the protocol and have changed it to offer security models that are custom for the organization. The security that is offered is able to provide specific access to the Internet at different levels within the organization. If a virus, malware or a hacker is trying to retrieve information from the organization, it will be prevented by the custom security that is available. This is done by providing different blocks and firewalls than are available to the general public. If an individual is required to get onto the Internet, is done through a secure server that doesn’t provide as easy of access to others that may be online. There are several security models that are offering new control models at this level of security and which are offering new types of implementation for those that are required to get onto the Internet. Different security is also being developed for e – commerce, specifically which is adding in layers of security to payment transactions and movement that is occurring online (Joshi et al, 2001). As the security of organizations are threatened, different solutions become a main component of the work that is done. Another model that is known to provide solutions is known as the inter – organizational collaborative module. This gives specific control requirements at different levels when one is not only working in the main environment but also with direct access to online security. The enforcement that is achieved moves beyond the basic hierarchical structure of offering access at different levels. Instead, there is the ability to have access at different levels combined with control solutions that are used on the Internet. The security enforcement that is used with this type of model is then able to provide options for those that are working online as well as for end – users that are accessing a site on the Internet. The main hierarchical structure offers both firewalls as well as secure displays that are incorporated into the organizational structure as a part of the workflow management. Fine – grained access controls are also added into this, which provides more options for enforcement of security. Employees won’t be able to implement malicious attacks on the corporation and mistakes will be stopped with the security. This is furthered by the ability to stop Internet users from attacking the organizational data systems or hacking into different components, which provides more security from both sides needed (Kang, Park, Froscher, 2001). Conclusion The components that are associated with Internet security are creating changes in how organizations function and in the proponents that are involved with saving and maintaining data. The problems that may arise within an organization include internal, external and e – commerce attacks that relate specifically to the Internet. This can cause damage to the data of the company as well as other components that assist with the daily functioning of a business. To change this, there is the need to enhance security levels within the organization. Using different architectural structures to support the security of the data while providing access to what is needed by employees and end – users is the main way in which this can be eliminated. The structures and models that are available will easily enhance the security within an organization while providing the same amount of access and functioning of technology within the corporation. References Carr, H, A Snyder, Bliss Bailey. (2010). The Management of Network Security: Technology, Design, and Management Control. New York: Prentice Hall. Cheswick, William, Steven Bellovin, Aviel Rubin. (2003). Firewalls and Internet Security: Repeling the Wiley Hacker. Boston: Addison – Wesley. Kang, Myong, Joon Park, Judith Froscher. (2001). “Access Control Mechanisms for Inter – Organizational Workflow.” ACM (15). Joshi, James, Walid Aref, Ari Ghafoor, Eugene Spafford. (2001). “Security Models for Web – Based Applications.” Communications of the ACM (44), (2). Khosrowpour, Mehdi. (2004). The Social and Cognitive Impacts of E-Commerce on Modern Organizations. Pennsylvania: Idea Group Publishing. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Organizational Security on the Internet Essay Example | Topics and Well Written Essays - 1500 words, n.d.)
Organizational Security on the Internet Essay Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/information-technology/1742019-internet-security-paper
(Organizational Security on the Internet Essay Example | Topics and Well Written Essays - 1500 Words)
Organizational Security on the Internet Essay Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1742019-internet-security-paper.
“Organizational Security on the Internet Essay Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/information-technology/1742019-internet-security-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Organizational Security in the Internet

Behavioral Aspects of Project Management Paper

Wagner and Hollenbeck (2005) defined organizational culture as: a pattern or basic assumption - invented, discovered, or developed [by a firm's members] to cope with problems of external adaptation and internal integration - that has worked well enough to be considered valid and, therefore, to be taught to new members as the correct way to perceive, think and feel in relation to those problems.... 36) organizational culture gives members organizational identity, facilitates collective commitment and promotes organizational stability....
2 Pages (500 words) Essay

Cultural Organization in Vienna

It will also have a parking allowance with very high security.... tructure of the museum Structure of the museum can be divided in two forms; the physical plant and the organizational structure.... An organizational structure is an informal or formal framework that entails all rules and policies in which an organization can arrange ways of communication, leadership and authority and distribute duties and responsibilities....
5 Pages (1250 words) Essay

Internet Safety

the internet is vulnerable to several threats and the general requirements of safety of networks and systems of information can Confirmation of declared identity of institutions or users (Bejtlich, 2006).... internet safety is one of the primary objectives for the ever growing internet and the concept ensures that not only content but the safety of the users, their very confidence to trust the online elements, requires to be protected. Enterprises and individuals use internet not… st for communication but to avail the various activities like online business, transfer of important organizational data and large scale communication....
4 Pages (1000 words) Essay

Security in an Organization

Today, most of the organizations depend on the internet for sending messages.... Therefore, the chance of leakage of their confidential data is more as the internet is open media.... In the essay “security in an Organization” the author analyzes proper security as an inevitable requirement in an organization for the smooth running of its business without incurring chances of many risks.... Building security in an organization facilitates to protect important data....
2 Pages (500 words) Essay

Chief Security Officer

It is essential for a CFO to possess knowledge of how the internet can be integrated into the general security of the company.... Furthermore, a CFO requires an adequate understanding of global politics and make out how much politics influence organizational security.... In addition, global experience enables the CFO to understand the intricate global internet network that poses a threat to an organization's IT system (Fay, 2011).... internet, as a tool, connects the world in a single sphere....
1 Pages (250 words) Essay

Organisational Deviance/Organisational Misbehaviour/Organisational Sabotage

Sometimes employee of company steals paper; envelopes use office phone, internet, and vehicles for personal purpose, producing false receipts for meals etc are all included in theft.... In clothing shop disgruntled employee's leaves the alarm putting the security tags for the reason that customer put off the alarm at the time of leaving the shop.... The contribution of fiction to organizational ethics....
2 Pages (500 words) Essay

LDAP and Security

This paper "LDAP and security" casts light on the fact that in current email application packages each software package has a private address register, however how we search for an online address of somebody which is not at all known to us by email.... This paper presents a comprehensive analysis of the security features which LDAP supports, then it will assess that how can access control list be implemented on the LDAP servers.... Afterward, it will also analyze the security auditing features that LDAP supports in addition to the detection of brute forcing attacks (such as NAT) against an LDAP server....
8 Pages (2000 words) Coursework

Illegal Physical and Internet Intrusion

Senior director of security for Oracle, Wynn White, mentions his observations about database security in the following words: "According to one recent Forrester study, 80 percent of data security breaches involve insiders, employees, or those with internal access to an organization, putting information at risk.... This paper ''Illegal Physical and internet Intrusion'' discusses why data security is of importance to an organization.... Furthermore, it throws light upon what might be the physical or internet-based threats to an organization's database....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us