Find and fix security vulnerabilities

Assignment Help Software Engineering
Reference no: EM131462647

I have to reply to this article. Nowadays almost all corporate assets are maintained on an electronic platform, which makes them open and vulnerable to cyber-attacks. If an attack succeeds and a sensitive information is exposed, the customer / the victim will seek for someone to blame. "While it is not easy to prove breach of the legal duties to protect electronically stored information, some claims are starting to succeed.

And aside from any litigation topics, even a court victory will not remedy reputation, operational or enterprise damage" (Buckley, 2014). "In the aftermath of the financial collapse of Lehman Brothers in 2008 it is no longer acceptable for senior management to deny knowledge or responsibility for corporate governance and that includes responsibility for the safety of data" (Goucher, 2016).

International Organization for Standardization (ISO), in the ISO 27001:2013 standards regarding Audit and Risk, pushes for engagement from not only IT and HR but also the middle level of management that are not much involved in the security issues.

That implies that those who worked on this standard were looking to use it as a tool for promoting a culture of security throughout organizations. Harkins (2016) stated that information security and privacy are issues of corporate social responsibility (CSR). Corporate social responsibility means that companies look beyond their profits and legal obligations to their broader role in society.

Although not many companied consider security and privacy risks to be CSR issues, the tendency may change over time, as public and corporate awareness of the risks continues to expand. For example, consumer data protection is one area of information risk that is already widely treated as a CSR issue; it is even included in the International Standards Organization corporate social responsibility standard (ISO 26000).

It seems to be a mutual understanding that a company should be responsible for data protection and take all necessary measurement to find and fix security vulnerabilities. However, security and protection of any organization are most effective when they include all aspects of company's operation, i.e. not only technical controls but also the way staff do their work.

A company must implement security practices that need to be user-friendly enough that users see the point of making the effort to use them.

References Goucher, W. (2016).

Information Security Auditor - Careers in information security. BCS Learning & Development Limited.

Print ISBN-13: 978-1-78017-216-3. Web ISBN-13: Harkins,W. M. (2016).

Managing Risk and Information Security: Protect to Enable, Second Edition. Apress.

Print ISBN-13: 978-1-4842-1456-5 Buckley, M. B. (2014).

Corporate Responsibility of Data Privacy, Protection. Properties Magazine.

Retrieved from https://www.buckleyking.com/news-details/2014-11-corporate-responsibility-data-privacy-and-protections

Verified Expert

These days cyber-attacks are common in every business irrespective of size. Companies need to increase the consciousness among the employees. Increasing awareness among the staff would prove to be the most cost-effective methods of stopping a cyber-attack.

Reference no: EM131462647

Questions Cloud

What is the difference between wholesalers and retailers : What is the difference between a department store and a discount store with regard to selling orientation and philosophy?
What is net working capital to total asset ratio at year end : What is the net working capital to total assets ratio at year-end?
Which is a chemical form of arthritis : The first is entitled The Myths and Facts About Joint Pain and the second is an article about foods that can trigger gout, which is a chemical form of arthritis
How a lack of or delayed access to health care : Explain how a lack of or delayed access to health care has an impact on an individual's health status
Find and fix security vulnerabilities : It seems to be a mutual understanding that a company should be responsible for data protection and take all necessary measurement to find and fix security vulnerabilities
Compare and contrast community and regional shopping centers : What can nonstore retailers offer their customers that in-store retailers cannot? Compare and contrast community shopping centers and regional shopping centers.
Can you make predictions on behavior : Can you make predictions on behavior? In the short-run? In the long-run? Is there a public policy available to address the issue in a positive way.
Toward principal of loan-how much will go toward interest : how much of the payment will go toward the principal of the loan and how much will go toward? interest?
Evaluate the impact of governance on implementation : Describe the change management model your chosen organization uses. Evaluate the impact of governance on implementation of strategic goals

Reviews

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd