StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Management Systems - Essay Example

Cite this document
Summary
This essay "Information Management Systems" focuses on the word botnet is derived from two English words, robot and network. A botnet can be described as a collection of programs connected via the internet which communicate with other programs so as to perform certain tasks. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
Information Management Systems
Read Text Preview

Extract of sample "Information Management Systems"

Information Technology (IT) The word botnet is derived from two English words, robot and network. A botnet can be described as a collection of programs connected via internet which communicate with other programs so as to perform certain tasks. Botnets have been used to for negative functions across the internet such as sending spam e-mails and participating in DDos attacks. However, botnets can also be used for positive and worthy courses across networks. This includes a very important role in controlling an IRC channel. Rootkits can be defined as stealthy and malicious software applications designed to hide the existence other processes and programs from being detected in normal methods. They are used to enable privileged access to computers for specific individuals. Rootkits are often associated with malwares. Rootkits can either be installed automatically in computer systems or they can be installed manually by attackers who gain access to computer network roots. This can lead to direct attacks by exploiting vulnerabilities such as password access through cracking. Once they have been installed, they can take full control of the system, modifying existing software and applications. Detection of rootkits is very difficult since they also attack software programs that are aimed at controlling them. They can however be detected using other trusted operating systems, signature scanning of computers, memory dump analysis, as well as other behavioral methods. Removal of rootkits after detection is a very complicated process and almost practically impossible, most especially if they attack the kemel. The only viable solution of removing them is through reinstallation of the operating system. Man in the middle attacks involves third parties on the internet making connections and sharing messages with other user on the network. The attacker can eaves drop communication between two people and get in the middle of the communication and takes control over it. This happens at Wi-Fi access points. Browser security refers to the application of internet security measures to web browsers so as to protect computer systems and data across networks from malware or from t=other third parties that may breach privacy of individuals using the internet. DLP in data security is an abbreviation for Data Loss Prevention. This refers to the various solutions aimed identifying and detecting any potential breach of data transmission or data ex-filtration and subsequently preventing such processes through monitoring and blocking sensitive data during end point actions (in-use), network traffic (in motion) and during rest (data storage). There are data loss prevention software applications that facilitate this process. If I were responsible for security of a small firm, I would definitely recommend Snort. This is because of its ability to prevent network intrusion as well as in system detection. The system is also developed by a renowned software developer, Sourcefire, hence the need to trust the workability of the application. The application has over 400, 000 users which makes it worth trying out. A SYN flood attack can be defined as a form of denial of service attack, where by the attacker send a multiple SYN requests to the targeted system in a bid to use enough resources on the server so as to make the system less responsive to legitimate traffic by the targeted users. This attack can be prevented through a variety of counter measures including filtering, firewalls and proxies, hybrid approaches, SYN cookies, increasing backlogs among others. LTE (Long Term Evolution) and WiMax are the emerging trends in technology for high speed mobile broadband internet service. Both technologies seem to have similar objectives of enabling connectivity to wireless data across the globe via mobile phones, laptops and other devices. The two technologies are being widely used in mobile technology due to their high speed connectivity as compared to the 3G network that was previously being used. There is a debate over which of these technologies is better than the other with certain manufactures and consumers preferring one over the other. The differences among them are very small considering that they are both highly effective technologies. Computer infrastructure has have increasingly come under threat from various sources. Some of them gain access through systems in conventional ways that can be prevented if adequate security measures are taken (Haag, Cummings, McCubbrey, Pinsonneult, and Donovan, 106). Access control can be used to improve security of infrastructure by preventing unauthorized individuals and applications from accessing the systems. Biometric analysis has so many advantages including the fact that individuals have certain unique features such as finger prints, voice, and eyes among others that can be used to enhance security by allowing only authorized personnel. The other advantage is that individuals do not need to memorize access codes as authorization is mainly done using their own bodies. Among the disadvantages include the fact that one’s unique features may be deformed such as fingerprints being affected by chemicals. This makes it hard for them to access certain places even though they have the authority. Ailments can also cause changes in an individual’s biological features including eyes and voice. Password hashing refers to the process of using cryptographic algorithm in convert passwords into a sting of fixed length characters referred to as fingerprints. The advantage of this is that it makes password more difficult to crack hence enhances security of systems by preventing unauthorized access. A digital certificate can be described as an attachment to any electronic message mainly used for purposes of security. Digital certificates are mostly used in cases where there is need to prove that users are who they claim to be when sending messages across networks. Individuals can send encrypted messages by getting authorization from the Certificates Authority (CA). A hot site is an example of a back up site which is a duplicate of the main site. It also has computer systems and an almost complete backup of the users’ data. In case of a disruption on the main site, the organization can easily relocate to the hot site (Haag, Cummings, McCubbrey, Pinsonneult, and Donovan, 156). Key risk mitigation strategies for this online business would include having a hot site, enabling hashing of user passwords, using digital certificate in cases where we suspect the authenticity of certain users among others. Work Cited Haag, Cummings, McCubbrey, Pinsonneult, and Donovan. (2004). Information Management Systems, For The Information Age. McGraw-Hill Ryerson. Print Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“IT Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
IT Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1483939-it
(IT Essay Example | Topics and Well Written Essays - 750 Words)
IT Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1483939-it.
“IT Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1483939-it.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Management Systems

Managing Information Systems- evaluating information systems

This research will begin with the statement that the role of Information Management Systems cannot be overestimated.... According to Boddy, Information Management Systems present business firms with opportunities to leverage their potential.... This research is aimed at providing a report on issues of managing information systems.... In the UK, there are a number of firms that have responded to the continued development of new management information systems....
6 Pages (1500 words) Essay

Information Management Systems at Google Plus

The paper analyses the Information Management Systems at Google Plus.... Among the various advancements that have been made in this era is the creation of Information Management Systems.... Information Management Systems can be described as a collection of both hardware and software combined with the ability to receive and filter raw data and then process and use it to create new data relevant to a certain organization.... The ability of Information systems (IS) to perform these tasks has made life a whole lot easier for organizations operating on the basis of large amounts of different types of information flowing within and without the company in order for it to function efficiently....
9 Pages (2250 words) Case Study

The Companies Requires Information Management Systems

The paper "The Companies Requires Information Management Systems" states that in the expectation of the administration, the implementation of the new system implies that the reports presented to the boards will be accurate to guarantee consistent declaration of the results of business performance.... The company requires Information Management Systems, which can flexibly undergo dynamic development to add competitive advantages to businesses.... The justification of the need for this system is that SC is an extremely busy pharmacy and has many customers, whom it cannot serve adequately without the use of an integrated information management System....
10 Pages (2500 words) Essay

Laboratory Information Management Systems

This is a dissertation conducted by investigating the possible practical applications of the Bell-Lapadula model in library Information Management Systems.... The objective of this research is to ascertain the ways in which the Bell-Lapadula model can be applied to Laboratory Information Management Systems.... And how to facilitate the construction of multilevel secure systems, which can protect information of differing classification from users....
5 Pages (1250 words) Research Proposal

The Bell-Lapadula Model for Laboratory Information Management Systems

The objective of this research 'The Bell-Lapadula Model for Laboratory Information Management Systems' is to ascertain the ways in which the bell-Lapadula model can be applied to Laboratory Information Management Systems.... The author states that in recent years, the Bell-LaPadula model has been employed more and more in scientific laboratories, and has also dominated efforts to build secure computer systems for laboratory use.... The use of the Bell and LaPadula model has been successful in modeling information that is relevant to security, even though this success might be responsible for the vagueness of the model about its primitives....
3 Pages (750 words) Essay

Health Information Management Systems Strategic Plan

This term paper "Health Information Management Systems Strategic Plan" discusses and illustrates the significance of the health information management system (HIMS) in the XYZ world.... The Internal Medicine Clinic (i) StrengthsIn strengths and opportunities, the significance of the systems in terms of the accuracy of data keeping, and ways through which the process can be improved are looked to earn the process more credibility by limiting avoidable medical errors....
7 Pages (1750 words) Term Paper

Resources that Support Information Management Systems in Healthcare

"Resources that Support Information Management Systems in Healthcare" paper identifies the resources that support Information Management Systems in healthcare, discusses the key benefits of using decision support systems in clinical practice in the UK.... In the mid of 1950, information management system in healthcare was developed the devices such MYCIN and INTERNIST-1.... The devices such as clinical guide lines, formal medical terminologies, and information and communication systems and computers are playing a vital role in healthcare informatics....
6 Pages (1500 words) Assignment

Information Management Systems: Making the Airline Industry Competitive

The paper "Information Management Systems: Making the Airline Industry Competitive" discusses the information management programs as managing the voluminous amount of information is the solution to inaccurate analytics and inefficient information redundancies, particularly in industries like airlines.... Reliable airline's Information Management Systems and advanced optimization features are major tools for success in a highly competitive environment (Vanhove 86)....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us