Keeping Information Secure Essay

1741 words - 7 pages

Keeping information secure in the workplace


A hacker is a person who breaks codes and passwords to gain unauthorised entry to computer systems. A system hacker knows about designing and maintaining operating systems and a password hacker knows how to find out someone else's password.

Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers enjoy learning more about how computers work and get excitement out of cracking the security of remote computer systems. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application ...view middle of the document...

They take the term virus from the biological word, because they do just what a real virus would do to a human.

A virus is inactive until you execute an infected program or application or start your computer from a disk that has infected system files. Once a virus is active, it loads into your computer's memory and may save itself to your hard drive or copies itself to applications or system files on disks you use.

Some viruses are programmed specifically to damage the data on your computer by corrupting programs, deleting files, or even erasing your entire hard drive. Many viruses do nothing more than display a message or make sounds at a certain time. Other viruses make your computer's system behave erratically or crash frequently. Sadly many people who have problems or frequent crashes using their computers do not realize that they have a virus and live with the inconveniences.

To prevent this from happening
Purchase anti virus software
Purchase and install an antivirus program such as Kaspersky Antivirus, Norton Antivirus or McAffe Antivirus on every computer attached to the network. This is the only way to protect them all against infection. Some companies provide discounts or bulk licenses for multiple
Keep anti virus software updated
Keep all antivirus programs updated. An antivirus program that isn't updated will not prevent new virus infections. Update all the antivirus programs on the network when they're installed and schedule regular updates.
Install firewalls
Install software firewalls on all of your computers. Installing a software firewall is important in preventing worms from spreading in your network. A worm is like a virus, but instead of using files or emails to spread, it will exploit vulnerabilities in networked computers. Worms are often so effective that every computer on your network can be infected in minutes.


Fraud means to pretend you are someone else and use their money, accounts to buy things or subscribe to things in their name. Fraud has been around for a long time, it is not something that has only recently arrived with the Internet.

With more consumers discovering the convenience of e-commerce they now feel comfortable purchasing goods and services online.  As the internet continues to thrive with technology and millions in sales, the malicious crime of fraud has become a bigger issue.

These individuals who do this crime have easy access to advanced software that enables them to manipulate your computer to obtain the sensitive information they want. To make matters worse, you can be a victim of computer fraud without even knowing your machine has been compromised.

It is important your business protects itself from this because many businesses are not doing enough to protect their own data and that of employees and customers.

Data misuse

Copying and illegal transfer of data is very quick and easy using online computers and large storage devices such as hard disks and...

Other assignments on Keeping Information Secure

Communication Paper

1339 words - 6 pages technology is hardware and software working together along with data and telecommunication technology. Health care information systems (HCIS) are valuable in a health care setting because the information includes raw facts, and that information also helps facilitate the decision-making process. Before 1960s, physicians were to hand write medical information; fortunately, the early 1960s introduces a new form of record keeping. Electronic health

Asdf Essay

684 words - 3 pages computing devices such as smartphones and tablet computers. IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. They are responsible for keeping all of the technology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or gain control of the internal systems. Information assurance The

Wan Security

1341 words - 6 pages security is about keeping the network equipments safe from being physically damaged, tampered with or from being stolen. Network security is about keeping the information safe over the network while transmission. Access control systems refer to the control systems that would allow a user to access the information, that could be crucial to the organization, or the private information of the organization. These are discussed in detail in the following

Role Of It Systems In Virtual Stores Implementation

1154 words - 5 pages defined to us, let us try to understand the IT landscape. Information System will help us address the following key issues: * How to make secure and fast payment using mobile platforms? * How to manage the vendors effectively so that they can deliver the products to end consumers on time? * How to manage bulk data? The orders we receive need to be filtered, cleaned and analyzed * How effectively we analyze the reports and forecast


528 words - 3 pages than is absolutely necessary • handled according to people’s data protection rights • kept safe and secure • not transferred outside the European Economic Area without adequate protection Employees have the right to request what information is held on record and must do so in writing, the company can also charge an admin fee which should be no more than £10. As a private limited company the Freedom of Information Act 200 does not apply to us.


951 words - 4 pages on a flash drive, external hard drive or even online which make it secure. Financial accounting as in computerized accounting is in deeded outstanding the traditional way of accounting by ways of accuracy, efficiency, timing, data keeping and sending and receiving information but with the computerized training of three or two weeks does not show the understanding of the double entry principle, the application of the principle, how the


1186 words - 5 pages . Patients do not have the right to access their PHI for verification of information and keeping a copy, unless the information has been complied for use in criminal administrative or civil action. Information that includes psychotherapy notes and PHI that is kept by any covered entity subject to the Clinical Laboratory Improvement Amendments of 1988 is also restricted (Green ad Bowie 2005). Generally speaking the only person who can authorize the

Recording, Analysing And Using Hr Information

988 words - 4 pages keeping employees personal and employment details recorded and kept up to date and stored for a specified number of years. * To ensure that decisions relating to redundancies, training and recruitment of staff can be made based upon the information that is held on file. Two types of data that are collected within Outlook Expeditions are: * Information relating to absences which helps managers to monitor the number and type of absences

Managing The Business Enterprise

1317 words - 6 pages date information. The investment in the application of a Retail Enterprise Management System (REMS) shows that Kudler knows the value of quality programs to assist in record keeping of a retail store. The REMS maintains the information for the company’s fundamental functions such as: treasury, sales, accounting, and acquisition of goods. The REMS collects information from various transactions across departments, business cycles, and individual

Hippa Compliant Procedures

2478 words - 10 pages management of PHI and its security maintenance. Current Business Issues: To propose a procedure for Gary Job Corps healthcare department it is important to review current literature on the topic so that the procedure is designed keeping in mind the latest issues in the field. In today’s era it extremely difficult to maintain manual information and to keep it secure thus many institutes and


1663 words - 7 pages flexible approach. • Develop and support an intelligence led approach in line with the requirements of IRMP. • Provide a flexible infrastructure capable of meeting the developing needs of the Service. • To provide access to systems and information in a form that meets national standards of interoperability. • Provide secure systems and secure data consistent with BS7799 and in-line with current legislation

Similar Documents

Six Images Of Managing Change Essay

417 words - 2 pages keeping the productivity and the quality of work intact. Objectives The main objective is Database management for the data quality and usefulness. To improve Zephyr databases, by including employing field personnel experienced in GPS technology. Data to build and improve your dataset. Constrains The systems has to be centralized which holds all the information and data and also should be assessable to all the authorised personal

Information Systems Proposal Essay

776 words - 4 pages operation. For example, financial information system provide information about the business progress and competitive, in other word; bottom line, the company revenues. * Financial information system deal with keeping record of finance data of the business. Financial information system is a computer base within the finance department of the business. The financial information system is vital for protection of business legality and malpractice from

Electronic Health Records Essay

1270 words - 6 pages President George Bush created an executive order that would lay the foundation for a new health information technology infrastructure. This infrastructure would help improve health care quality, reduce medical errors, and increase effective exchange of health care information among health care providers. This system would also provide that Americans have access to electronic health records while keeping that information secure. The DHHS

Information Systems Essay

1181 words - 5 pages health and lowers costs. The committee also has to keep in mind of what government regulations are. HIPAA requires that the backup of files are located offsite and are required to be encrypted so the committee will have to decide where that should be (Summary of Summary of the HIPAA, no date). Each system is required to have a firewall. Choosing information systems is not just about the hardware it has to be secure also. The committee also has to