Itm 431 Module 1 How to Achieve Business Information Security in Cyberspace

Topics: Computer security, Password strength, Password Pages: 4 (1348 words) Published: January 27, 2013
In the 21st century, a business without a network mirrors a city with no roads. Small businesses, in particular, arguably have a greater need for network connections and information systems. Small businesses rely on information systems for several things, to include their communication and customer database. Small businesses rely on network connectivity for communications. With the advancement in Voice Over Internet Protocol (VOIP), many businesses are using the internet to save on phone costs. Additionally, it is common for a business to have an in-house communications system. Take some installations in the Air Force for example; they use an Instant Messaging (IM) service for member-member contact. Many times, it is easier to reach someone through IM or social networking. However, these commodities present their own challenges about IT security. However, that is not all that needs protection. In fact, in a more broad view, communication is viewed as a small bite. When a business sells its product/s online, it is at distinct advantage over mom and pop stores because they have to collect certain data to complete the transaction; shipping, credit card, billing, and personally identifiable information (PII). (Bradley, 2010) This system is located on a network accessible to employees in order to conduct business. Companies are not only morally obligated to protect customers’ information; it’s the law. The May 2002 Financial Information Safeguards Rule requires businesses to develop a written information security plan that describes, among other things, the specific ways their employees should protect consumer information. The plan must be appropriate to the business's size and complexity, the nature and scope of its activities, and the sensitivity of the information its employees encounter, and must be regularly monitored. (Federal Trade Commission, 2002) The company must consider all areas of its operation, including three that are particularly important to...

References: Bradley, H. (2010, April 21). Customer Databases as Marketing Tools. Retrieved November 20, 2012, from Small Business Computing:
Federal Trade Commission. (2002, October 17). FTC Offers Guidance on How to Protect Customer Information. Retrieved November 20, 2012, from Federal Trade Commission:
Indiana University. (2012, August 21). Knowledge Base. Retrieved November 20, 2012, from University Information Technology Services:
Kessler, G. C. (1996, January). Passwords - Strengths and Weaknesses. Retrieved November 20, 2012, from
Natarajan, R. (2008, June 8). The Ultimate Guide For Creating Strong Passwords. Retrieved November 20, 2012, from The Geek Stuff:
Schulman, A. (2012). Top 10 Database Attacks. Retrieved November 20, 2012, from The Chartered Institute for IT:
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Essay on How to Achieve Business Information Security in Cyperspace
  • Business Law Module 1 Essay
  • Information Security Essay
  • Itm 431 Module 2 Security Measures for the Cyberspace: Part Ii Essay
  • business information system Essay
  • how do business in china Essay
  • Comparisons of Information Security Management Frameworks Essay
  • Essay about Information Security 1

Become a StudyMode Member

Sign Up - It's Free
Julia Roberts | Jesse L. Martin | Justice League 001 (2016) (2 covers) (digital) (Minutemen-Thoth).cbz (- Nem -)