Security

Submitted by: Submitted by

Views: 146

Words: 828

Pages: 4

Category: Other Topics

Date Submitted: 09/29/2013 08:20 PM

Report This Essay

Owning a company comes with a lot of responsibilities and duties, one of those duties is to have a good security plan, without a good security plan your company could be exposed to a security breach. A security breach as you may not know can cause a lot of noticeable harm to your company. A security breach refers to the violation of any policy or law that is designed to secure your company, in other words, it can be defined as any activity that compromises the confidential nature of certain information. We might think using our computers to save information and data is safe, but in reality there is a great amount of danger when it comes to saving important information on a computer, that is because the more sensitive information that is stored online, the higher the chances of internet security breach and computer security breach are and with chances like that, it gets easier for fatal loss such as; serious financial loss, identity theft to happen. The purpose of this paper is to discuss the best course of action to take to ensure that a security breach is contained and eradicated; I will also be including a malware protection policy based on the case of the Grocery Store, Inc. that was breached by a remote attacker.

As we learned, the Grocery Store Inc. was currently breached by a remote attacker who infected the supermarket chain with a server based malware program. As more researched was done, it was confirmed that the job was done from the inside and that the plan was developed by a current employee. The employee/ attacker slipped a malware onto the servers which affected all of the company’s 200 grocery stores. The malware was able to snatch card date from customers as they swiped their credit cards through the checkout counter machine and transferred the card date overseas. As you can see this is a chaos, and the company’s reputation can be at risk all because of a disgruntled employee. In cases like this it is best to gather information from employees or...