Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Essay:
Computer Security Systems
The report provides new security tools and techniques that computer and IT (Information Technology) professionals, network security specialists, individuals, corporate and public organizations can employ to enhance security of their computer and information systems. In the fast paced IT environment, new threats appear daily that make many organizations to lose data and information that worth billions of dollars. In essence, the computer and IT security professionals are required to develop new computer and IT security tools and techniques to protect their information resources.
The present age of universal computer connectivity has offered both opportunities and threats for corporate organizations Typically, since corporate and public organizations rely on computer and network systems to achieve their business objectives, they also face inherent risks which include electronic fraud, eavesdropping, virus attack and hacking. In essence, some hackers use malicious software with an intention to gain access to corporate computer systems in order to modify, copy or delete a corporate document. Hackers can also use a worm to perform unwanted functions. Organizations also face a (DoS) denial of service attack to prevent legitimate users to get access to their computer services.(Stallings, 2011). By consequence, organizations may lose data that worth billions of dollar from these attacks if they do not implement effective corporate computer security systems.
Objective of this report is to develop the new security tools and techniques that can assist organizations in New Zealand to protect their computer and IT systems. Other organizations in another countries can also use the outcomes of the report to protect their computer assets and other information resources against attack from external intruders.
Computer Security Tools and Techniques
Several tools and techniques can be used to enhance security of computer systems. This paper identifies and discusses Cryptographic standards, Data encryption standard, Firewall, Intrusion detection System, Intrusion Prevent System, Antivirus Security Policy, and Wireless Security systems as effective security tools and techniques for computer systems.
Cryptographic standards are among the techniques that can be used to protect unauthorized access to corporate data. The cryptographic standards are the security tools and strategies that organizations can use to enhance the security of their computer resources using the encrypted data known as ciphertext. One of benefits of the cryptographic technique is that the data transferred from one location to other location will change to nonsense text thereby preventing unauthorized individuals to read the data. (Osterhage, 2011).Typically, only authorized person having the decryption key can read the text send over the network. Rapid development of internet technology has made many organizations to transfer data online from one locations to the others. For example, many multinational corporations have branches scattered all over the world and the employees of these organizations are required to transfer data from one location to the other. Moreover, websites of many organizations are integrated with application program where customers are required to submit sensitive data such as credit card, social security number and other sensitive data to conduct business transactions. In essence, external intruders can use different techniques such as sniffing, password cracking and eavesdropping to steal sensitive information over the network. Thus, cryptographic security standards are part of the computer security techniques to protect the data transferred over the network, which can only be read by authorized individuals.
Despite the benefits that can be derived from the cryptographic security standards, the security of data using the encryption technique depends on the secrecy of the encryption key. Many intelligence agencies use the cryptographic security standards to protect their data because they use a very strong encryption. In essence, it is critical to keep encryption algorithms very secrete. Although, cryptographic security techniques have been used for more than 100 years ago, however, the system is still being used till today because of its effectiveness for data protections. Moreover, IT experts have significantly improved on the encryption technique to enhance their effectiveness for computer security systems.
Data encryption Standard
Data encryption standard is another technique that organizations can employ to protect computer system. Before 1990, the data encryption technique is used to provide security for the ATM (Automated Teller Machine) network system. However, with the development of the internet technology, many financial companies are using the data encryption standard to encrypt data transferred over the network. With the development of online commerce, it is revealed that the cryptographic security technique is very critical for securing organizational data. Despite the benefits of the data encryption standard, the shortcoming of this security technique is that the attackers can use sophisticated method to attack this security device in order to steal sensitive information, which has made the data encryption standard to become obsolete. Typically, it was found that the 56-bit key for the data encryption security system was no longer effective against special purpose cracking software or a powerful computer attack . The shortcoming identified in the data encryption standard leads to the development of the advanced encryption standard.
Advanced Encryption Standard
The AES (Advanced Encryption Standard) uses the 128, 192, and 256 keys for the encryption of 128-bit data blocks. In the present business environment, the AES has become effective tool for the computer security systems. Typically, many organizations use the AES for the security system of many modern computer systems. Despite the benefits of AES in enhancing security system of the computer systems, however, the algorithms of the public key signatures require high level of computation. However, SHA (secure hash algorithms) delivers short message which is effective for the cryptographic security functions.
Secure Hash Algorithms
Between 2004 and 2005, there was a wave of computer an information system attacks that cast doubt to virtually most of the exiting security systems. Typically, the wave of attacks caused a considerable concern to the cryptographic community. In essence, harsh function standard was created to perform different security functions. The Harsh Function is a new computer security standard commonly used because of its flexibility, fast in hardware, laptop, computer server and desktop. Typically, SHA-1, SHA-2 and SHA-3 have been developed and development of secured harsh model has provided a considerable security systems for computer and information resources because no attack has been recorded on the SHA-2 and SHA-3. (Stallings, 2011).
The wave of new computer and information systems such as LAN (Local Area Network) and WAN (Wide Area Network) among business and public organizations has led to the development of new security systems called Firewall. The LAN is a deployment of the network technology across a specific geographic region. However, WAN Is the deployment of network system across two more geographical regions. The LAN and WAN assist organizations to share files, communicate, transfer and receive document among computer users. However, network attackers have taken the advantages of these network systems to steal sensitive information . Several security devices have been developed to provide effective security to the network systems.
Firewall technology is one of the effective network security systems that assists in protecting the LAN and WAN from external intruders. Typically, firewall assists in blocking the unauthorized access into the network system. In essence, the firewall systems are the hardware and software consisting of filtering router, host computer, IP packet, and application gateway to achieve a filtering and authentication objectives. The internet is very critical for proper configuration of firewall to enforce network security system.
Chadwick,(2012) reveals that many organizations have taken the advantages of rapid development of internet network to interconnect their network and computer systems using the LAN and WAN technologies. While internet offers several advantages to organizations, however, internet also offer inherent risks because of its insecurity. Typically, internet only requires weak or no authentication system making it to be inherently insecure. For example, NFS (Network File System) grant access to any user from any remote host. Moreover, internet allows passwords to be transmitted across the network making them vulnerable to be captured and replayed. Many internet software or low cost package have a design flaw because of insufficient testing and poor design. In essence, many people and businesses use these package due to their low and availability. However, readily available package such as UNIX Send Mail program has numerous vulnerability in it. Some unscrupulous individuals use sniffer program to monitor network in order to steal sensitive information such as username and passwords. Moreover, hackers use the Port Scanners to penetrate remote computers over the internet network to capture people's passwords and usernames. All these hacking strategies make the internet network systems to be opened to vulnerability.
The firewall is defined as secured internet gateway used to provide security for the organizational network systems. The use of firewall for the network security depends on an organization policy. One of such policies is to disallow the other network system apart from the corporate network systems. In essence, external users will not be allowed to get access to the corporate network and this is achieved using a strong authentication system. If an external user attempts to get access to the corporate network, the firewall will block the person from…[continue]
"Information Technology IT Security Systems" (2014, October 20) Retrieved December 11, 2016, from http://www.paperdue.com/essay/information-technology-it-security-systems-192890
"Information Technology IT Security Systems" 20 October 2014. Web.11 December. 2016. <http://www.paperdue.com/essay/information-technology-it-security-systems-192890>
"Information Technology IT Security Systems", 20 October 2014, Accessed.11 December. 2016, http://www.paperdue.com/essay/information-technology-it-security-systems-192890
Information Technology (IT) is a broad-based term that includes a combination of the acquisition, processing, storage and dissemination of information in a computing or telecommunications platform. In terms of a scientific discipline, it is relatively new, appearing in a 1958 article in the Harvard Business Review in which the authors said, "this new technology does not yet have a single established name. We shall call it information technology (IT)" (Dunn,
IT Fraud Evaluate the factors that add to corporate fraud The business fraud can be credited to conditions emerging from deceptive monetary reporting and misappropriation of possessions. These conditions are 3 and all 3 features of the fraud triangle have to exist for fraud to take place. Management or staff members have to have the reward or pressure to dedicate fraud, see the opportunity emerge and have the ability to justify the
Computer IT Security Implementation Provide a summary of the actual development of your project. Because small corporations have to work under conditions of conflicting information technology in many instances, the requirement of maintaining these systems details entails far too many time-consuming processes that have to be carried out. This allows for the business to work in a logical order and promotes a more logical approach to the making of business decisions. The end
IT Acquisition Management for a new Video Shop Individual Project Activities Identification of a problem Organization: Component: Showtime Video Store Business Capture Group The problem is that there is no real information technology security measure employed in the video shop. There is very little awareness of the necessary IT security measures amongst the current management heads which is why they need an effective IT security plan and structure to implement to ensure there is no copyright infringement
IT Acquisition Activity 9: Value Proposition The adoption and implementation of more complete and appropriate e-business structures will provide immense intangible value to the company as well as an estimated economic benefit $2 million over the life of the project. Activity 10: Acquisition Strategy The proposed project is the acquisition and implementation of a new IT security system and stronger E-business structures. The total initial development cost of the project is estimated at $264,600,
Non-discretionary controls means than there is mandatory access control. In this type of system, security is enforced by a strict set of rules that creates a hierarchy of permissions that users cannot override. Essentially, this type of system is meant to hinder insider users from actually working against the system. Users cannot access crucial internal information as to become spies, thus they cannot see the internal designs of the system
Security Assessment Services, Inc. New York New York 10201 Ms J.S. Johnson, Security Director Company Z New York, New York 10211 Enclosure: Company Z. Security Assessment Network security threat assessment Company Z. is faced with some serious challenges in responding to a number of significant trends that have emerged in recent years that will invariably affect security procedures and processes. For example, in 2013, there were more smartphones in use than personal computers as more telephony customers