Comments (0) Cite this document
Abstract The report demonstrates a typical surveillance system for an organization, in order to protect the critical information assets from physical theft, unauthorized access, and natural disasters. Consideration is given to IP camera based surveillance systems, biometric systems for attendance and logging employee activity, Intrusion Detection systems for advanced security and enforcing access policies by active directory…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
Read TextPreview


Download file to see previous pages Organizations require advanced protection and security from these threats and vulnerabilities. Security is a mandatory to protect anything that needs to be protected as ‘’ covers the basics and states it as “Prevention of and protection against assault, damage, fire, fraud, invasion of privacy, theft, unlawful entry, and other such occurrences caused by deliberate action”. A definition associated with information and communication technology will demonstrate the concerns related to network communication privacy, confidentiality of data over the network, accessing unauthorized classified data, access to prohibited network domains and utilizing Internet for concealed communication (Network Security. 2007). The security predictions that were published in an article for the year 2010 incorporates new advanced threats named as advanced persistent threats (APT), Cyber war escalates, VoIP attacks, Perimeter shrinks and harden, social networking sites, malware, DLP for intellectual property protection and malware as a service (MaaS) (Watchguard Unveils Top 10 Security Predictions for 2011. 2011). In order to protect the computer network, organizations emphasize on implementing hardware and software application as well as a framework in terms of surveillance security. Network security issues can lead to many different aspects. For example, if the server containing customer data is breached, organization will lose its credibility and trust among the customer and that will result in business loss. Similarly, if a critical system is hacked by internal or external sources, organization’s financial data along with goals and objectives can be revealed to other competitors. In a legacy network of 1-Click Mobile Phones Ltd, internal security controls are implement but surveillance security is not available. In order to eliminate the threats including unauthorized access, viruses, Trojans, malware and malicious codes, 1-Click Mobile Phones Ltd has decided to implement a surveillance security system that will provide following features : It will track unauthorized access of employees to departments, Monitor activities of employees related to physical interference with critical hardware components, User activity on the network and unusual behaviors will be monitored User authentication and Authorization will be implemented However, organizations implement firewalls to deploy packet filtering, eliminating viruses and malicious codes, intrusion detection system to continuously sense the behavior of the network, incident response teams to recover the loss on immediate basis and IP cameras to monitor their critical information assets on the network. Physical Infrastructure Policy In order to implement surveillance systems, Internet Protocol based surveillance systems are considered more cost effective along with various features. A study conducted by Axis communication in 2010, a company that is a global market leader for professional products and services related to IP surveillance systems. The study revealed that in midsized or small medium businesses, IP surveillance systems are considered cost effective as compared to analog surveillance systems (Cost of IP surveillance revealed to have dropped below ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
Retrieved from
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Technology of Information Security

...? Technology of Information Security Technology of Information Security Introduction The use of cryptography is a necessity for the consequence of the revolution of information in the world today. Electronic communications is widely used and to make conversations very confidential, cryptography gives the solution for the problem though it has been majorly spawned by a serious debate (Mel and Baker, 2000). The technique has been in existence for a long time but is not yet fully reliable thus posing a danger to all the information that is shared via the internet. Methods of encryption are on the rise because of the rapid growth in the technology sector all over the world. As technological advancement keeps coming, several reliable... ...
3 Pages(750 words)Essay

Information Technology Security

...? Information Technology and Security Introduction CIA de s confidentiality of information, integrity of information, and availability of information. Information bears significant value, especially in the contemporary business world. The protection of such information as bank account statements, credit card numbers, personal information, government documents, and trade secrets remain a critical part of information security. Confidentiality of information relates to safeguarding of information from disclosure to...
3 Pages(750 words)Essay

Information Technology Security

...Information Technology Security Submitted by: XXXXX XXXXXXX Number: XXXXXXXX of XXXXXXXX XXXXXXXX XXXXXXXXX Subject Code: XXXXXXX Date of Submission: XX – XX – 2009 Number of Words: 3892 (Excluding References) Table of Contents Table of Contents 1 Introduction: 2 What is Computer Related Crimes: 3 Types of Computer Related Crimes: 4 Conclusion: 14 References 16 In the world today where much depends upon computers and their associated networks, computer –related crime appears to becoming a major problem. Describe and analyse the range of computer related crimes and, based on this analysis, offer up some effective countermeasures. Introduction: Over the past few decades technology has grown to great heights and is still improving... that...
15 Pages(3750 words)Essay

VOIP security (information technology)

...Running Head: VoIP Vulnerabilities VoIP Vulnerabilities of Introduction VoIP or Voice over Internet Protocolis the technology which carries voice communications over packet switched networks or the IP networks such as the Internet. But VoIP networks are weak and are vulnerable to attacks. In my paper I will discuss the five security concerns related to VoIP networks. The five security threats are man in the middle attack, Phreaking, vishing, VoIP spam and distributed denial of service attack or simply DoS attack. Man in the Middle Attack VoIP network are vulnerable to MITM or man-in-the-middle attacks, this is due to insufficient verification of data, in this form of attack the attacker uses eavesdropping to make connections... with...
3 Pages(750 words)Essay

Surveillance Technology quite prohibitive in terms of other advanced sensors as well (Yang et al., 2005)⁠. The BBC conducted an interview with computer security expert Phil Zimmermann, who expressed his fears of abuse of surveillance technology (Vallance, 2009)⁠⁠. Zimmermanns central argument was that current technology and its ongoing trends point to an increasing ability for police and law enforcement authorities to know “everything about everyone all the time.” He explains that the coupling of CCTV systems with face-recognition algorithms lead towards something that is able to undermine democratic insitutions. The biggest fear is that it is not just the criminals who are affected by data...
8 Pages(2000 words)Term Paper

Information technology director security plan

...breaches to senior management staff and the HR department. If I was an information technology director, I would: Ensure the protection and management of information technology resources. Ensure access control. Write down a formal security plan with all security vulnerabilities, authorizations and the security plan. Arrange a project team which would keep a check on security. Ensure purchase and implementation of virus protection, spam-filtering software, firewalls, updates, passwords and physical security. Keep and review regular backup of data. Data should be stored on the...
1 Pages(250 words)Coursework

Surveillance technology

...Surveillance technology In this rapidly expanding world, issues regarding security are giving rise to surveillance technology systems (Lee, 2008:139). As activities of random violence increase, the sphere of freedom is contracting regardless is whether an office, home, a retail store, or a public institution. Electronic surveillance technology has finally caught up with the expanding demand for innovative and advanced surveillance technology products which include the digital video recorders, panning, tilting cameras, wireless nanny cams, hidden spy cameras, and full fledged motion...
7 Pages(1750 words)Essay

Technology of Information Security

...TECHNOLOGY OF INFORMATION SECURITY Technology of Information Security Affiliation At the present, the majority of business organizations use a distributed computing environment to store their data and information. In this scenario, their data and information are stored in different locations. For instance, in many cases data and information are kept on a centralized server. On the other hand, some organizations prefer to store their data in the decentralized data storage system. In this scenario, each user is individually responsible for managing and updating his own data on his own...
2 Pages(500 words)Essay

Information Technology- Security

...Information technology- Security Information technology- Security Information Assurances Information assurance describes the measures that organizations take to protect and restore the quality of information in a bid to enhance the reliability of its sources. According to Herold & Rogers (2011), the concept has many dimensions that include completeness, validity, steadfastness, timeliness, integrity and confidentiality. In organizations, the protection of information from unauthorized access and alteration is the main aim of information assurance. As such, the appropriate use of information helps in securing organizations from risks. In the United States, records concerning the use of information indicate that the concept has been... ...
2 Pages(500 words)Research Paper

Information Technology Security

..., and overseeing access rights (SAMPEMANE 62-65). New demands for SpiderWeb will be put together by client administration to the information or framework manager for endorsement and handling. In specific cases, the task of rights may be secured by the workers part or gathering participation, and oversaw by pre-established approvals for that gathering. Sellers or builders may be allowed access, focused around their association. The data owner of SpiderWeb will review and evaluate the request based on job functions. Once approved, access will be configured by the data custodians or system administrators (Tolone et al. 29-41). The provisioning methodology ought to incorporate an effective system for...
11 Pages(2750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic INFORMATION TECHNOLOGY: SURVEILLANCE SECURITY for FREE!

Contact Us