Information Technology Security Over The Last Several Essay

PAGES
4
WORDS
1389
Cite

¶ … Information Technology Security Over the last several years, the Internet has evolved to the point that it is a part of any organizations activities. As both governments and businesses are using this new technology, to store as well as retrieve significant amounts of information. However, this heavy reliance on various IT related protocols are having adverse effects on these organizations. As they are facing increasing amounts of threats from cyber criminals that are seeking to exploit a host of weaknesses. A good example of this can be seen by looking at statistics that were compiled by the FDIC. They found, that in third quarter of 2009 there was $120 million stolen (from governments and corporations), out of this number small business lost $25 million. This is significant, because it shows how the tremendous reliance on IT-based technology, is increasing the overall vulnerability that these organizations are facing. To fully understand how an entity can protect itself requires: examining the problems, solutions to address them, the impact of the Internet on the organization's security, examining RAID fault tolerance and recommendation of what products / services should be utilized. Together, these different elements will provide the greatest insights, as to the overall scope of the challenges and solutions all organizations will face.

The Issues that Organizations will Face on the Internet

The overall challenges that an organization will have on the Internet is from: malware, botnets and spyware. Malware is a type of software program that will infect a computer system, without the owner knowing that this occurring. Botnets are a collection of software programs (called bots) that are designed to seek out and find vulnerabilities in a host of different computer systems. Spyware is similar to malware, in that it is software that will attach itself to another computer without the owner's knowledge. Criminals are using these different tools to: seek out and attack vulnerable computer systems. Where, they will use various social networking sites, to identify organizations that could have possible vulnerabilities. At which point, they will use one or a combination of them to steal sensitive information. This is important,...

...

Once this takes place, it means that there is the possibility that sensitive pieces information could fall into the hands of criminals or spies. ("The Effects of Spyware, Malware and Botnets," 2010)
Solutions to Address the Problem

The biggest problem that all organizations are going to face is, preventing security breaches from occurring. Part of the reason for this, is because human beings are the largest risk, as they will require outside access to the various tools including: e-mail, telnet, FTP, web-based systems and remote login. This is problematic, because it means that hackers can exploit this weakness, in order to gain access to sensitive information.

As a result, a comprehensive security protocol needs to be created that will address: the organization's security technology, policies / procedures, awareness and training. One way that this can be accomplished is through interconnecting the different tools together. As far as security technology is concerned, this means that a number of different tools can be used to help protect sensitive data from possible breaches to include: encryption, the use of bio metrics, multiple personal identification verifications and firewalls. ("Guide to NIST Information," 2010)

The Impact of the Internet on the Organization's Security

The Internet is having a tremendous impact upon the security of an organization. This is because, the increasing reliance on computers and other technology (for storing information), has caused many businesses as well as governments to face a host of unprecedented threats. This has lead to a shift, in the way an organization is looking at and addressing their security needs. Part of the reason for this, is because many entities are fearful of the possible fall out that occurs when this kind of situation takes place. In the case of businesses, this could mean that they may lose customers or have their reputation damaged. As far as governments are concerned, this could lead to a public relations disaster and political fallout. A good example of this occurred recently, when Wiki Leaks released hundreds of thousands…

Sources Used in Documents:

Bibliography

6998 Storage System. (2011). LSI. Retrieved from: http://www.lsi.com/storage_home/products_home/external_raid/6998_storage_system/index.html

The Effects of Spyware, Malware and Botnets. (2010). Billboard Drama. Retrieved from: http://www.billboardmama.com/blog/blog1.php/2010/12/15/the-effects-of-spyware-malware-and-botne

Guide to NIST Information. (2010). National Institute of Standards. Retrieved from: http://csrc.nist.gov/publications/CSD_DocsGuide.pdf

RAID Products for System X. (2011). IBM. Retrieved from: http://www-03.ibm.com/systems/storage/product/systemx/scsi_raid.html
What is RAID. (2010). Search Storage. Retrieved from: http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci214332,00.html
Wiki Leaks Cable Rattles U.S. Government. (2010). Arab News. Retrieved from: http://arabnews.com/world/article203739.ece


Cite this Document:

"Information Technology Security Over The Last Several" (2011, January 22) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/information-technology-security-over-the-49503

"Information Technology Security Over The Last Several" 22 January 2011. Web.20 April. 2024. <
https://www.paperdue.com/essay/information-technology-security-over-the-49503>

"Information Technology Security Over The Last Several", 22 January 2011, Accessed.20 April. 2024,
https://www.paperdue.com/essay/information-technology-security-over-the-49503

Related Documents

Information Technology -- Annotated Bibliography Information Technology Baker, N. (2011). The Borderless Enterprise. Internal Auditor, August, 28 -- 33. This article endeavors to explain the various trends in digital media. The author contends the use of digital technology is evidence of a deeper trend and shift in global culture. The article is as philosophical as it is technical. This article could be considered a technical article or a philosophy of technology article. Durkee, D.

End Notes 1) Given the recent tardy but well-meaning responses by the federal, state and local officials in the Gulf Coast, it can be assumed that the nation remains relatively unprepared for a terrorist attack of September 11-proportions. The U.S. is struggling to negotiate a nuclear arms treaty with Iran and North Korea (the latter having recently agreed to forego additional nuclear weapons testing in exchange for light-water nuclear reactors, a

" (Doukas, Maglogiannis and Kormentzas, 2006) The following illustration shows the evaluation Platform Architecture. Figure 3 The Evaluation Platform Architecture Doukas, Maglogiannis and Kormentzas (2006) state that the patient state vital signs are monitored through a PDA device attached to the patient and transmitted to a computer for evaluation through wireless access or Bluetooth. Additionally the patient site is monitored through use of a camera. The software that has been developed is used

Remote access controls. Network security management. Password policies. Compliance with the policies and procedures of the company is very vital to the organization, and the policies and procedures should be clearly communicated to the appropriate business teams. Intruder: The suggested treatment for the attack by the external intruder such as hacker is to ensure that all communication within the organization is encrypted to deter the unauthorized access to the company data. Moreover, the organization

Technologies, Including Future Information Technology Information technology plays a vital role in the success of any contemporary business organization. IT is responsible for the vast majority of communication between parties, and is integral to the preservation and storage of information that pertains to a particular organization. With advances in technology occurring at an increasingly rapid rate, companies are often left with just two choices -- to embrace modern technology and the

SECURITY and PRIVACY - the following security and privacy requirements apply: The Office does not accept responsibility for the privacy, confidentiality or security of data or information not generated by this office or transmitted from external sources into the system. The Office does not accept responsibility for loss, corruption, misdirection or delays in transmission of personal data through the system. Users are responsible for the integrity of all data and