Tuesday, May 14, 2019

Information and Systems Security Essay Example | Topics and Well Written Essays - 750 words

Information and Systems Security - Essay ExampleBut with this ease of randomness access comes the print of security. With the increase of knowledge flow, there has been an increase in the number of attacks on information by hackers. Attacks such(prenominal) as Denial of Service (DoS) Attacks, Spoofs, Sniffing, etc. have increased with the increase in the approachability of hacking tools which be free of cost. Valuable information is lost in the process. For example, if a customer buys a product of a exceptional organization through their web-site and a hacker presents himself as the organization and receives the money from the customer, valuable information such as the ID of the customer, his credit card numbers, his passwords are all stolen by the hacker. Therefore such information has to be transferred securely over the Internet. Encryption is the most common way of securing valuable information succession transmitting over the Internet (Rahman, 2003). Networks are secured i n a different manner. They are secured using tools called Firewalls. Whenever legal proceeding or information between a customer and an organization are being carried turn out, a particular pattern is followed. Firewalls recognize and allow only these transactions or processes to be carried out and block out all the unrecognized patterns. By implementing Firewalls, most of the attacks from the hackers can be kept out. Securing a network beneficial does non happen. There are many issues to be considered when making policies for network security. The three main issues patronage in the earlier days were Confidentiality, Integrity and Availability. Due to the advances in the technologies, these issues have been mostly resolved. But in the present day Networks, other issues have appeared. These issues will eventually result in the breaching of confidentiality, integrity and availability thereby defeating the cause of coming up with Network Security policies.Security FactorsConfident iality Confidentiality is ensuring that sensitive information does not fall into the hands of those who are not authorized to have it (Dhillon, 2001). Confidentiality is also known as cover or privacy. Integrity Integrity means that the information is protected against unauthorized changes that are not perceptible to authorized users (Kinkus, nd). Authenticity Authentication means that the parties involved in communication first prove their identity element before communication can begin (Tipton & Krause, 2007).ThreatsRisk to DataData is the most crucial plus of a company. Remote Data Backups Inc, a becomeer in data security mentions the following executable reasons for threats to data (RemoteDataBackups.com, 2007)Hard Drive Failures Hard drives are mechanical magnetic storage devices that are highly susceptible to failure. Head crashes, circuit board shorts, electrostatic shocks, power surges, etc. can all lead to immediate crash of the hard drives. Viruses Dangerous viruses c an easily wipe out tones of data in matter of seconds. They are designed to affect nearly all parts of an IT system such as Operating Systems, Applications, Networks and Databases. System Changes Making any inadvertent changes to an IT system may render the system useless. spring Failure Power surges, sags and failures can damage hard drives

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.