Cracking The Code The Contemporary Issue Of Essay

Cracking the Code The contemporary issue of physical security/IT security

Modern day businesses and organizations face the contemporary issue of physical security/IT security. Whether a business needs to maintain network security for a website or server, or an organization needs to restrict access to a server room, there are several aspects facing the problem of dealing with IT security. Any general computer networking instructor teaches the DOD and/or OSI networking models and from this IT professionals understand that everything start from the bottom, like with the physical level. Therefore, IT professionals tasked to handle IT security, must base their foundation or overall strategy in IT security management on the physical security of software, hardware, and equipment.

Some organizations forget the importance of physical security in an IT security setting may become distracted by the safeguarding features of certain software-based security merchandise and overlook the significance of protecting the network and all its components at the base level, the physical level. Research lends to current applications being ineffective. "Existing security approaches are either inapplicable, not viable, insufficiently scalable, incompatible, or simply inadequate to address the challenges posed by highly complex environments such as the smart grid" (Li, Cheng, Zhang & Tong, 2013, p.637). Besides the maintenance software, the "white hat" hackers, the trained personnel, and the software meant to eradicate any potential threats, physical security like addition of security guards, becomes an important step in producing successful results in the field of IT security. The essay will the physical and technical aspects of IT security; how it relates to physical security, from two different perspectives. Physical security/IT security can become a great way to not only allow for inclusion of security personnel in businesses, but also allow for the growth of the security field in the ever-expanding IT part of business and commerce.

The contemporary issue of physical security/IT security

What is IT security? First, it is important to look at the various aspects of IT security as discussed in the introduction. Things like viruses and hackers have become an all too common occurrence within the IT world. However, some people may not know how hackers or "black hat" hackers get the information needed to break into high security servers and websites. An article on hacking discusses the low-tech ways and techniques in which hackers gain the sensitive information needed to hack into businesses and organizations.

The first step comes from acquiring the information from an employee or personnel from a business organization. Sometimes a simple phone call allows the would be hacker access to information that can lead to password cracking and identifying who in the organization or business may be in charge of IT security. From there, hackers can trick people into giving those things like their mother's maiden name, where they live, and even very sensitive information like a social security number. Hackers are ingenious at times and can easily thwart efforts of businesses and organizations that attempt to deal with IT threats.

The second step comes from infiltration. Hackers or other people seeking to steal private information from businesses or organizations tend to go there and/or physically speak with personnel, sometimes pretending to be personnel or installation/service workers. They may then steal hardware like laptops and hard drives containing sensitive information, or may physically hack into their systems from a place in the building that could have access to secure servers. In essence, there is a variety of ways and methods into which a hacker, for instance, can gain access to IT related information and then wreak havoc digitally. Therefore, security guards at strategic checkpoints may play a crucial part in IT security.

IT security in the sense of physical security may not seem like a crucial part of the IT industry at first. However, that is far from true. IT security enables businesses like those in the video game industry to keep online pirates and hackers from stealing their video games and sensitive information from the public before a release of a game or update. Often people will try to hack popular video game companies in order to gain access to undisclosed plots and stories, leading to millions in video game sale losses should this occur. An article discussing IT security problems, explains the importance for such measures within the video game industry. "IT security issues are an important aspect for each and every organization within the video game industry. Within the video game industry alone, you might not normally think of security risks being an issue. But as we can and have seen in recent news, no company is immune to security risks no matter how big or how small" (Mohr & Rahman, 2011, p. 1).

...

Vandalism can happen for many reasons. There could be a protest, a rally, something happening in relation to politics and so forth. Vandals can come and not necessarily steal, but damage any of the hardware and equipment in a building. An instance in a college in NYC had vandals come from a different university to break windows, computers, and ruin the hallway because of a protest the students wished to participate in. Although the incident did not result in any serious injuries, thousands of dollars in computer equipment were destroyed. Things like this can happen anywhere.
An article discussing heuristics, discusses how participants may evaluate IT security tools for increased efficacy.

Participants who used the ITSM set found more problems categorized as severe than those who used Nielsen's. We analyzed several aspects of our heuristics including the performance of individual participants using the heuristic, the performance of individual heuristics, the similarity of our heuristics to Nielsen's, and the participants' opinion about the use of heuristics for evaluation of IT security tools (Jaferian, Hawkey, Sotirakopoulos, Velez-Rojas & Beznosov, 2014, p. 311).

Although physical security of IT related locations may be different. It can still be a means to consider evaluation of physical security in IT locations. If businesses or organizations saw the importance and need for increased physical security, the demand for such employees may increase.

There is a need for physical security within the IT industry. Video games, software developers, they have all generated enough business to build offices both nationally and internationally. To protect from potential thieves, hackers, and pirates, the most important aspect of IT security, physical security, must be implemented in various stages from access into a building or office to additional security for important sections like the server room or main computer room. Things like security cameras and sign in sheets may assist security offices in identifying potential hazards and assist law enforcement in tracking any suspects.

There are a total of three main aspects or components to physical/it security. For instance, any kind of obstacle a security company or officer can place in order to prevent potential thieves and attackers from getting through into the interior where the business or organization keeps the hardware/software/equipment. Measures include various locks, walls, fencing, water sprinklers (fire), fireproof safes (explosions, bombs), and even security gates that detect weapons or anything metal. Second, notification and surveillance systems, put in place, like heat sensors, lighting, smoke detectors, alarms, intrusion detectors, and cameras all show, record, and provide an additional la all show, record, and provide an additional layer of physical security. Finally, techniques in apprehending attackers (preferably without any damage done) and recovering quickly from vandalism like fires and even just natural disasters. Natural disasters like Hurricane Katrina can wreak havoc and cause massive damage to electrical and computer equipment.

Discussing the issue from two viewpoints

Working within the IT Industry

From working as a computer analyst to working as a graphics designer, many in the IT industry believe the importance of security in safeguarding sensitive information and preventing system attacks and physical attacks. Employees in company's like Google INC. value physical security and the benefits a system integrating both IT security and physical security can have. One of the first benefits is better attack prevention.

There are hosts of problems that may happen when it comes to IT. As earlier mentioned, hackers come in all forms from online attacks, cyber-attacks like shutting down websites or physical attacks like going into the company and obtaining personal information of employees or the company or organization itself. Having additional support for threat detection removes the strain on IT specialists and allows them to focus on cyber-attacks. It also allows for better task management as things are effectively streamlined like surveillance and guest registration.

Maintenance for IT workers comes often during the after-hours of a business schedule. These are often the prime times for attackers to come and do their damage. Physical security keeps IT workers safe during these important times. With personnel there to safeguard the workers and the computer equipment, the company or organization experiences a higher level of safety.

A business requires quick recovery from attacks. Integration of a physical security system allows for faster recovery from both physical and cyber-attacks. Surveillance cameras allow for possible recognition of suspects. Guest…

Sources Used in Documents:

References

Armknecht, F., Maes, R., Sadeghi, A., Standaert, F., & Wachsmann, C. (2011). A Formalization of the Security Features of Physical Functions. Security and Privacy (SP), 2011 IEEE Symposium, 397. doi:10.1109/SP.2011.10

Chung, K., Boutaba, R., & Hariri, S. (2014). Recent Trends in Digital Convergence Information System. Wireless Pers Commun, 79(4), 2409-2413. Doi: 10.1007/s11277-014-2182-4

Jaferian, P., Hawkey, K., Sotirakopoulos, A., Velez-Rojas, M., & Beznosov, K. (2014). Heuristics for Evaluating IT Security Management Tools. Human -- Computer Interaction, 29(4), 311-350. doi:10.1080/07370024.2013.819198

Li, Z., Cheng, L., Zhang, H., & Tong, W. (2013). Communication and Cyber Security Analysis of Advanced Metering Infrastructure of Smart Grid. AMM, 325-326, 637-642. doi:10.4028/www.scientific.net/amm.325-326.637
Slater, D. (2015). Physical and IT Security Convergence: The Basics. CSO Online. Retrieved 23 January 2015, from http://www.csoonline.com/article/2117824/strategic-planning-erm/physical-and-it-security-convergence -- the-basics.html#specific


Cite this Document:

"Cracking The Code The Contemporary Issue Of" (2015, January 24) Retrieved May 5, 2024, from
https://www.paperdue.com/essay/cracking-the-code-the-contemporary-issue-2148149

"Cracking The Code The Contemporary Issue Of" 24 January 2015. Web.5 May. 2024. <
https://www.paperdue.com/essay/cracking-the-code-the-contemporary-issue-2148149>

"Cracking The Code The Contemporary Issue Of", 24 January 2015, Accessed.5 May. 2024,
https://www.paperdue.com/essay/cracking-the-code-the-contemporary-issue-2148149

Related Documents

Static & Dynamic Code -- Rootkits Static & Dynamic Code - Rootkits Static and Dynamic Code Static code is stationary or fixed (Rouse, 2005). It does not have the capacity to return information that is not preformatted. Static code is useful for webpages for information only. Programmers must declare the type of variable before compiling code. It is less flexible and less error prone. Static code has the advantages of finding weaknesses in

Constitutional, Legal and Ethical Issues in Criminal Justice Police abuse remains one of the most serious and divisive human rights violations in the United States. The excessive use of force by police officers, including unjustified shootings, severe beatings, fatal chokings, and rough treatment, persists because overwhelming barriers to accountability make it possible for officers who commit human rights violations to escape due punishment and often to repeat their offenses. Police or

Overcrowding in Prisons: Impacts on African-Americans The overcrowded prisons in the United States are heavily populated by African-Americans, many of them incarcerated due to petty, non-violent crimes such as drug dealing. This paper points out that not only are today's prisons overcrowded, the fact of their being overcrowded negatively impacts the African-American community above and beyond the individuals who are locked up. This paper also points to the racist-themed legislation that

Weblogs and Their Influence Weblogs have developed from a personal hobby and an Internet specialist niche to an important contemporary mainstream communications phenomenon. Weblogs or blogs have entered into almost every sphere of communications and knowledge sourcing. While blogging is relatively easy to explain in terms of the mechanics of its functioning, it is much more difficult to understand in terms of the implications and potential for development; particularly with regard

Microsoft, unlike Apple, is not secretive. Microsoft usually offers previews of their products several months before its official release (Lloyd, 2011). They do this as it is its corporate culture. This enables customers to evaluate the product before deciding to buy. On the other hand, the company is able to get feedback regarding to the product from the customers (Lloyd, 2011). This helps the company to improve on the product

Strategic positioning is the positioning of an organization (unit) in the future, while taking into account the volatile environment, plus the systematic recognition of that positioning. The strategic positioning of an organization includes the planning of the desired future position of the organization. On the basis of present and foreseeable progress, and the making of plans to realize that positioning. The strategic positioning method is devised from the business world. The method