ITM437 Information Security and Technology module 1 – Case SOURCES OF SECURITY THREATS: HUMAN, NATURE, AND TECHNOLOGY FACTORS
ITM437 Information Security and Technology module 1 – Case SOURCES OF SECURITY THREATS: HUMAN, NATURE, AND TECHNOLOGY FACTORS
Order 100% Plagiarism free paper
Module 1 – Case SOURCES OF SECURITY THREATS: HUMAN, NATURE, AND TECHNOLOGY FACTORS Case Assignment Based on the required reading materials and your own research, prepare a 4- to 7-page paper to discuss various threats to information security. You are to address the following questions in the paper:Module 1 Required Reading There are many sources of threats to information security: Human errors Cliff Edwards, Olga Kharif, and Michael Riley (2011). Human Errors Fuel Hacking as Test Shows Nothing Stops Idiocy Philip Sasser (2010). Human Error and Information Security Intellectual property Derek Slater (2012). Intellectual Property Protection: The Basics Pesante, L. (2008). Introduction to information security. Retrieved from https://www.us-cert.gov/sites/default/files/publications/infosecuritybasics.pdf Paul Rubens (2011). Stop Software Attacks From Destroying Your Servers Infosec Institute (Physical security: Managing the intruder) United States Government Accountability Office (2009). “Information Security: Cyber threats and vulnerabilities place federal systems at risk.” Information security attacks Brian Krebs (2011). Cyber Intrusion Blamed for Hardware Failure at Water Utility Perrow, Charles (2008). Software failure, security and Cyber attack. Natural and man-made disasters Iron Mountain. (2016). Protecting vital business from natural disasters. Retrieved from http://www.ironmountain.com/Knowledge-Center/Reference-Library/View-by-Document-Type/General-Articles/P/Protecting-Vital-Business-Data-from-Natural-Calamities.aspx Optional Reading Infosecurity. (April, 9). US Airforce designates six cyber tools as weapons. Retrieved from http://www.infosecurity-magazine.com/news/us-air-force-designates-six-cyber-tools-as-weapons/ Security strategies, retrieved from http://technet.microsoft.com/en-us/library/cc723506.aspx Brewster, T. (October 2010). Five security disasters to shake the world, retrieved from http://www.itpro.co.uk/628090/five-security-disasters-to-shake-the-world Why is information security an important issue? What are the sources of information threats (human, nature, and technology factors, etc.)? Assignment Expectations Your paper should provide a summary of your findings from the assigned materials and any quality resources you can find. Cite all sources and provide a reference list at the end of your paper. The following items will be assessed in particular: Ability to consolidate ideas from reading materials. Demonstration of your understanding of information securities from different perspectives. Application of your understanding of information security in a business or organizational environment.