High-tech Security a Top Priority

InstructionsYou are required to post 1 thread of at least 400 words and 2 replies of  at least 200 words each. For each thread, you must support your  assertions with at least 4 citations in current APA format. Each reply  must incorporate at least 2 citations. Acceptable sources include  peer-reviewed journal articles, books, the course textbook, and the  Bible. Note that you may use the article that is included with your  assigned reading as 1 of your sources.Thread: In the article, “Google search test shows no  progress in cyber safety: a year after breaches exposed, UKFast director  reveals that unsecure databases still likely to pose biggest cyber  threat to SME security,” database security is revealed as the most  fundamental part of creating a database, and it is vital to protecting a  company’s information assets from unauthorized access. In fact, SQL  injections have surpassed almost all other security vulnerabilities in  2013. Although security policies are often implemented to protect data,  information security remains every employee’s responsibility. Data in  the wrong hands can have a major negative impact on a business, and  security of the data ultimately falls on the creator of the database. In  this discussion board post, discuss the concept of database security as  it relates to the Bible. What mandates does God give us with respect to  protection of property? What real world examples support these biblical  truths?Replies: Post replies to 2 different threads that either support or refute the information presented in the thread.(Reply to the two threads below)Thread #ecurity  is the highest issue for today’s technology. While the world is going  digital it also means all of our important information is going digital  as well. From governmental security to personal security, we must always  be aware of the possible security issues that may crop up. “Security  concerns for internet-based attacks are some of the most persistent  challenges to database security. Hackers devise new ways to infiltrate  databases and steal data almost daily.” (SumoLogic, 2019). Simple data  breaches can cause chaos with identity and financial issues, but if the  security breach is larger it can cause millions if not more in damages.  Whether that is just for the company or if the breached leaked their  customer’s information. It’s  a business and its employees’ duty to keep their business and clients  as secure as possible, however, a lot more businesses aren’t as secure  as they should be. “With 43% of online attacks now aimed at small  businesses, a favorite target of high-tech villains, yet only 14%  prepared to defend themselves, owners increasingly need to start making  high-tech security a top priority, according to network security  leaders.” (Steinberg, 2019). Current technologies allow for more and  more business to be done online; however, it also opens up for more  attacks. Businesses’ must keep up with the current security precautions,  which explains the reason attacks are focused on weak points. Small  businesses starting out do not always make security a priority since  there are so many things owners have to do as they are building their  business and client base.Human error is still the highest issue beyond just subpar technical  security.  “Ironically though, even with 480 new high-tech threats now  introduced every minute, according to anti-virus provider McAfee, human  error still remains one of the greatest threats to organizations’  well-being.” (Steinberg, 2019). Employees and even clients must be extra  careful not to let information to be easily accessed.

Prof. Angela

4.6/5

Calculate Price


Price (USD)
$