The biggest computer security terror to business in the employee. The consensus in the computer industry is that 80% of computer security breaches are internally generated. These breaches would be attributed to the pursual sources: (Gunn, 1989, p. 62) deliberate attempts at sabotage; employee incompetence; and employee negligence. The Worker fitting and Retraining Notification Act (WARN) was passed in 1988. The goal of this formula was to give workers time to seek other jobs, begin suitable training programs, and give the community a head incision on the adjustment process. Computer security professionals believe that this also gives the disgruntled employee time to tamper with company computer and breeding organizations (Betts, 1989, p. 1). This concern is most acutely perceived in the securities, banking, savings and loan, and other industries experiencing layoffs due to financial difficulties, mergers, and/or acquisitions.
Certainly, one steering to minimize this type of threat is to take away system access privileges from those employees due to be terminated. This would definitely impact productivity but significantly reduce the threat.
e overwhelming majority of offenders were employees or ex-employees, which reinforces the notion that those with direct system contact are more likely to dedicate abuses (Hoffer and Straug, 1989, p. 37). Hackers are a threat, but insiders are definitely a more pressing threat. Table I shows a disruption of the typical offenders.
Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
No comments:
Post a Comment