preview

The Security Practices Of A Security System

Better Essays

Abstract.
Information in today’s world is promptly evolving and has tremendously changed the way we communicate on a daily basis. With the increase in mobile technology we now have constant access to information and services from our laptops, smart phones, tablets, and other web enabled devices. Nevertheless, even though information technology has brought colossal benefits to our culture it has also increased the impact of personal and private information. The research paper will exemplify the risks in not implementing a security system in the early stages of development. Another challenge that systems are facing, is how data has been collected and generated. With new ways of storing data a big number of rules are outdated thus data is …show more content…

In 2013 Target had a breach which was ranked among the worst ever. Before the target incident in 2012, Sony Play Station 3 (PS3) suffered a crucial security leak. In this incident they stole and gained access to personal information of PS3 user, such information stole was: users names, passwords, mail addresses, and credit cards. In other words, the attackers gained access to all your personal information that could potentially use it for their own interest, harming your family and possibly bank accounts. This trespassing was able to succeed because Sony didn 't keep up to date their security software and protocols. (Reisinger, 2014)
Sony could have prevented this breach if they have had a good protocol of security in case of any incident, not to mention that as part of your security plan you should always plan on having your system up to date so you can compete and protect your system against new threats. Many organizations don’t realized that by failing this important step you put your organization in hands of hackers, as the example of Sony in which it found itself in a privacy breach which affected millions of users accounts, Sony was also fined a large amount of money due to the information stolen. In other words, by not implementing or including software security to the system at the beginning of planning Sony could have had prevented this breach. Maintaining and having a secured system will always be more practical economically

Get Access