Verified Document

Information Technology Security Over The Last Several Essay

¶ … Information Technology Security Over the last several years, the Internet has evolved to the point that it is a part of any organizations activities. As both governments and businesses are using this new technology, to store as well as retrieve significant amounts of information. However, this heavy reliance on various IT related protocols are having adverse effects on these organizations. As they are facing increasing amounts of threats from cyber criminals that are seeking to exploit a host of weaknesses. A good example of this can be seen by looking at statistics that were compiled by the FDIC. They found, that in third quarter of 2009 there was $120 million stolen (from governments and corporations), out of this number small business lost $25 million. This is significant, because it shows how the tremendous reliance on IT-based technology, is increasing the overall vulnerability that these organizations are facing. To fully understand how an entity can protect itself requires: examining the problems, solutions to address them, the impact of the Internet on the organization's security, examining RAID fault tolerance and recommendation of what products / services should be utilized. Together, these different elements will provide the greatest insights, as to the overall scope of the challenges and solutions all organizations will face.

The Issues that Organizations will Face on the Internet

The overall challenges that an organization will have on the Internet is from: malware, botnets and spyware. Malware is a type of software program that will infect a computer system, without the owner knowing that this occurring. Botnets are a collection of software programs (called bots) that are designed to seek out and find vulnerabilities in a host of different computer systems. Spyware is similar to malware, in that it is software that will attach itself to another computer without the owner's knowledge. Criminals are using these different tools to: seek out and attack vulnerable computer systems. Where, they will use various social networking sites, to identify organizations that could have possible vulnerabilities. At which point, they will use one or a combination of them to steal sensitive information. This is important,...

Once this takes place, it means that there is the possibility that sensitive pieces information could fall into the hands of criminals or spies. ("The Effects of Spyware, Malware and Botnets," 2010)
Solutions to Address the Problem

The biggest problem that all organizations are going to face is, preventing security breaches from occurring. Part of the reason for this, is because human beings are the largest risk, as they will require outside access to the various tools including: e-mail, telnet, FTP, web-based systems and remote login. This is problematic, because it means that hackers can exploit this weakness, in order to gain access to sensitive information.

As a result, a comprehensive security protocol needs to be created that will address: the organization's security technology, policies / procedures, awareness and training. One way that this can be accomplished is through interconnecting the different tools together. As far as security technology is concerned, this means that a number of different tools can be used to help protect sensitive data from possible breaches to include: encryption, the use of bio metrics, multiple personal identification verifications and firewalls. ("Guide to NIST Information," 2010)

The Impact of the Internet on the Organization's Security

The Internet is having a tremendous impact upon the security of an organization. This is because, the increasing reliance on computers and other technology (for storing information), has caused many businesses as well as governments to face a host of unprecedented threats. This has lead to a shift, in the way an organization is looking at and addressing their security needs. Part of the reason for this, is because many entities are fearful of the possible fall out that occurs when this kind of situation takes place. In the case of businesses, this could mean that they may lose customers or have their reputation damaged. As far as governments are concerned, this could lead to a public relations disaster and political fallout. A good example of this occurred recently, when Wiki Leaks released hundreds of thousands…

Sources used in this document:
Bibliography

6998 Storage System. (2011). LSI. Retrieved from: http://www.lsi.com/storage_home/products_home/external_raid/6998_storage_system/index.html

The Effects of Spyware, Malware and Botnets. (2010). Billboard Drama. Retrieved from: http://www.billboardmama.com/blog/blog1.php/2010/12/15/the-effects-of-spyware-malware-and-botne

Guide to NIST Information. (2010). National Institute of Standards. Retrieved from: http://csrc.nist.gov/publications/CSD_DocsGuide.pdf

RAID Products for System X. (2011). IBM. Retrieved from: http://www-03.ibm.com/systems/storage/product/systemx/scsi_raid.html
What is RAID. (2010). Search Storage. Retrieved from: http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci214332,00.html
Wiki Leaks Cable Rattles U.S. Government. (2010). Arab News. Retrieved from: http://arabnews.com/world/article203739.ece
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now