What supporting content does Dr. Koonjbearry provide to justify his position?
Dr. Rajin K. Koonjbearry – Information Security Officer Data and infrastructure was not designed to be a secure network.The internet is used for many different things. Security layers have been added as needed to protect sensitive information.Internet has become part of the business process, the core.Life would change drastically if the internet went down. Finger Print Identification, already available in the marketplace.Converts the fingerprint data to numbers - problems with false positives.Our Instructor Guidance highlights security breach predictions provided by the Experian data breach. Are these predictions in agreement with Dr. Koonjbearry’s position?
Yes the prediction is in agreement with Dr Koonjbearry's position. Hackers are always looking for a way to get personal information to use for money or just because they can get it. Businesses need to look into to their security systems for personal information and see if they are able to purchase a better system.
After reading and watching our required course material, do you agree with Dr. Koonjbearry’s position? Why or why not? Give examples to illustrate your answer. Provide justification and citations for your points.Yes I agree with Dr. Koonjbearry's position. I have had somebody steal my identity from a site that I thought was secure. The next thing I know somebody is going on a shopping spree with my bank card. Lucky we were able to catch it in time and the bank shut my card off and canceled all purchases.There are so many different ways for hackers can get into different systems. Like if you use PayPal. How secure is that sever to know that your information is safe?
Dr. Koonjbearry stated that security concerns would get worse before it gets better because the internet's infrastructure was not designed as a secure network and to carry sensitive information (Koonjbearry, 0:38). Unfortunately, cybercriminals have forced organizations to beef up their security and protect their digital assets. Information security officers educate and test employees to help reduce risks. My organization invests countless hours in safeguarding customers' proprietary network information (CPNI). They start by educating employees on the "do's and don'ts" that put customers and the organization at risk. Annual training is mandatory to keep the risk low. Additional layers of protection are in place for customers, like two-factor authentication.
Dr. Koonjbearry's predictions aligned with Experian Data Breach's predictions. Some hackers are searching for financial gain, but cybercriminals trying to ruin an organization's credibility will cause more chaos. The assaults on large corporations place all of our personal and financial information at risk. So, ordinary citizens must take the appropriate steps to protect their personal and financial records.
I agree with Dr. Koonjbearry's prediction from 2016, and I am concerned that in 2022 we will continue to hear about cybercriminals' ingenuity to circumvent the best cybersecurity in the market. Medium and large organizations invest in unified threat management (UTM), also known as a Next-Generation Firewall (NGFW). Included in most offerings are anti-spam, anti-virus, content filtering, and web filtering. Companies that fail to invest in the appropriate security are at risk of cyberattacks, which could be detrimental to their bottom line and reputation. Even organizations that have invested in cyber security services will be at risk as cybercriminals are advancing their skills.
Hackers gained access to Colonial Pipeline's virtual private network account, causing the organization to shut down its entire gasoline pipeline system after receiving a ransom note demanding cryptocurrency ( Turton & Mehrotra, 2021). The attack impacted the companies earning potential and citizens who had to pay more for fuel due to the attack. Other examples continue to surface, so individuals and firms must continue to invest in cyber security.
Questions
1. Describe the characteristics of the digital world and the advent of the Information Age.
2. Define globalization, describe how it evolved over time, and describe the key drivers of globalization.
3. Explain what an information system is, contrasting its data, technology, people, and organizational components.
4. Describe the dual nature of information systems in the success and failure of modern organizations.
5. Describe how computer ethics impact the use of information systems and discuss the ethical concerns associated with information privacy and intellectual property.