StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Effectiveness of Security Technology in Reducing Security Threats - Research Paper Example

Cite this document
Summary
The paper "Effectiveness of Security Technology in Reducing Security Threats" was undertaken with a view to addressing the fundamental issue of security threats. Security issues have become very fundamental to deal with in the modern day organization particularly propelled…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Effectiveness of Security Technology in Reducing Security Threats
Read Text Preview

Extract of sample "Effectiveness of Security Technology in Reducing Security Threats"

EFFECTIVENESS OF SECURITY TECHNOLOGY IN REDUCING SECURITY THREATS ABSTRACT This study was undertaken with a view to addressing the fundamental issue of security threats that are robbing organizations of their integrity in the running of the most significant affairs. Security issues have become very fundamental to deal with in the modern day organization particularly propelled with the increased use of the modern information and communication technologies. Chapter one presents the problem statement, research objectives, research questions and significance of the study. Chapter two reviews the available literature on security issues. Chapter three presents the methodology and time feasibility. Chapter four deals with the discussions and findings of the research based on the data collected. Chapter five presents the conclusion and recommendations of the study based on the findings. CHAPTER ONE INTRODUCTION Problem Statement Security threats vary in both characteristics and magnitudes. One of the types of security threats faced by individuals is unlawful acts perpetrated by other individuals. Technology has lately developed to address this security threat. The most recent technology introduced to address this security threat is the surveillance technology (Monahan, 2010). This technology has played a very great part in enhancing security through prediction of unlawful and catastrophic events. Emergence of the information age after introduction of computers resulted to other types of security threats. According to Stoneburner, Hayden, & Feringa (2004), one of the security threats that were associated with the emergence of the information age is loss of essential information by an individual or a company. Several technologies in form of software systems have been generated to solve this security threat. Aim of the study The aim of this study is to analyze the current technologies in place with a view of examining how effective and responsive they can be to the prevailing security scenario. Research Objectives i. To find out if the security technology used to reduce security threats in the current society is effective. ii. To investigate the responsiveness of the current technology to the changes. Research Questions i. Is the security technology used to reduce security threats in our current society effective? ii. Is the technology responsive to the changes experience in the security threats? Significance of the study This study is significant in that it provides information about the success and failure of technology currently used to curb the security threats. CHAPTER TWO LITERATURE REVIEW The purpose of this literature review is to aid the researcher gain a clear understanding and insight of the problem based on various studies done in the same field or related field. Various scholars have various schools of thoughts and perspectives regarding security threats, the technologies used to address the threats, their effectiveness or failure and whether these technologies respond to the dynamic times and circumstances brought about by the constantly changing field of the information and communication technology. This chapter reviews the available literature on this topic and looks at these different perspectives that these scholars have put forward (Hall, 2008). Threats to personal security and that of property, information and other equipment have been in existence for a very long time. People have often engaged in criminal activities involving unlawful threat to individuals’ lives. The contemporary society is witnessing a shift in the security threats with the continuous development in the field of information and communication technology. Although it has come with various benefits, there are also numerous security challenges that have to be addressed (Hall, 2008). It has opened doors to great security risks thereby significantly interfering with the integrity of information and its reliability for use in organizations to make decisions, solve problems and exist in the wider society where information is a fundamental key to human rights and development. Various equipments are in use to address the looming security threats. Their effectiveness and failure form a significant part of this research and consequently this literature review. As applications become greatly accessible through the web, mobile and cloud devices, they extend over and beyond the perimeter defense. This exposes very significant information to greater risk. Consequently, the discovery of a proactive approach to eliminate these risks is very appropriate for individuals, government departments, societies and many other organizations to address these security threats. The use of HP fortify security center is one of the options to proactively deal with such risks (Stoneburner, Hayden, & Feringa, 2004). Moreover, Security Intelligence and Event Management systems allow the information technology experts to discover targeted attacks and monitor the usage of the information technology equipment. Magic quadrant for intrusion prevention systems gives an effective outline for vendors and what to look for when searching for an IPS. This is also considered a measure to sustaining the security issues related to bad vendors and IPS providers (Monahan, 2010). Surveillance is also widely used to address the security issues. Surveillance is defined as the monitoring of people’s activities, behavior, and the changing information in order to influence, manage, direct, and protect them (Hall, 2008). It is a very useful method of addressing these security threats as it recognizes and monitors the threats and investigates the criminal activities. It involves the observation from a distance by the use of electronic equipment, for instance the application and effective use of the CCTV cameras. It also involves intercepting information that is transmitted electronically by the use of equipment such as phone calls or internet traffic. There are various surveillance technology options that are available for use by many organizations, individual companies and governments across the globe. These options include but are not limited to the following: there is the use of computer surveillance which is particularly used to monitor data in the internet (Corgan, 2007).The use of telephones can also be used to prevent the issue of information interception thereby guaranteeing the reliability and integrity of the information. Surveillance cameras can also be used to effectively monitor criminal activities. The modern day societies and governments have seen millions of surveillance cameras installed across the world. The cameras are monitored by the use of automated computer programs and not humans. This enhances their effectiveness and accuracy while minimizing possible errors that humans can make. Social networks analysis is another form of surveillance that can help contain the threatening and daily worsening security situations. There is also the biometric surveillance whose purpose is mainly to measure and analyze the human physical and behavioral characteristics for identification, authentication and screening purposes. Aerial surveillance, data mining and profiling, corporate surveillance have all been used very effectively to help curb the security threats (Stoneburner, Hayden, & Feringa, 2004). In addressing these security issues, there are certain areas of concern that individuals, organizational departments and governments should keenly address. They should be able to ascertain how much they are reducing the business risks using the available technological resources. This can be greatly ensured by the implementation of the basic risk assessment and management techniques. This can help deliver very fundamental and substantial rewards for the involved organizations and government departments. Another issue that the organizations ought to significantly look at is a consideration on whether they are protecting the sensitive data that powers the business (Corgan, 2007). There are some data that are very fundamental to the day-to-day running of the business and must be kept safe and effectively protected. The organization ought to be able to know this data and establish effective measures to keep the information safe and out of accessibility by individuals who are not authorized to do so. The organizations need to establish an effective information protection structure to prevent issues of data loss and breaches to the information systems that pose very great risks to the overall performance of the entire organization. CHAPTER THREE METHODOLOGY AND DESIGN For this research, a mixed research method was the most appropriate for use. The method like the name suggests involves both qualitative and quantitative research methodologies. A major advantage of this research method is that it enabled the researcher to avoid the weaknesses of both quantitative and qualitative research methods while maintaining their advantages (Hall, 2008). This outstanding advantage is what has made this topic to adapt the plan of research method for the proposed research paper. Quantitative part of the research was undertaken in form of a survey. According to Mitchell & Jolley (2012), a survey has the capability to collect a lot of information about a sample with diversified characteristics. Therefore, using the survey design, selection of a diversified sample, and selection of data from the sample was assured. The survey would be undertaken inform of a self-administered questionnaire. According to Cargan (2007), a self-administered questionnaire is applicable to several respondents simultaneously. The research involved several participants. However, it had a very limited time thus the need for the researcher to collect data simultaneously from all the identified respondents. Qualitative part of the part of the research was undertaken by identification of participants. Data was then collected from the identified participants using interviews. CHAPTER FOUR DISCUSSION/FINDINGS This research set to explore the security threats, giving information on the effectiveness of the devices that are currently used to prevent the security threats and whether the technologies ensure better rewards in terms of curbing the threats. It was found out that indeed many organizations are suffering from numerous security threats. Information and communication technologies have been appreciated for the great benefits that they have created in most organizations. They have led to increased productivity of most organizations. They have also brought about more efficiency and effectiveness with regards to the performance of tasks. What could be performed by several individuals can now be performed by just one computer. The competitive advantages of the organizations that have successfully embraced the technologies have also gone a notch higher (Monahan, 2010). Unfortunately, these technologies have opened new security threats that were never witnessed before. Security issues were initially involving individuals perpetrating unlawful acts such as robbery, murder, and other criminal activities. However, with the continued use of ICTs, fresh security challenges have arisen. It was found out that most organizations are looking for ways of solving the threats that threaten to crumble their information systems. Now more than ever before, computer viruses, warms, unauthorized access, hacking, cyber crime, and cracking among many other vices have rocked the information systems that are in use by other organization. The very significant and sensitive data that enable organizations to run have been accessed by malicious individuals. Consequently, some companies have collapsed; others are at the verge of collapse. This has been a major blow to the whole society. Some of the individuals who have lost their jobs as a result of the collapse of the organizations that employed them have taken to crime, opening way for other security threats. They have to earn a living. Some go to the extent of robbing and killing (Mitchel & Jolley, 2012). There are several techniques that have been utilized in an attempt to curb these security concerns that are threatening the lives of organizations. For the information systems, issues of restricting access have been greatly emphasized. Organizations have restricted access of information systems to only those who have authority to do so. Ant viruses have also been put in place to curb the security threats brought about by viruses and other malicious software. There has also been enhanced use of digital signatures to enhance the integrity of the information that flows in and out of organizations. Laws have come up to curb the cyber crimes and other security threats that have rocked the society and organizations at unprecedented rates (Stoneburner, Hayden, & Feringa, 2004). The use of surveillance technology has been very fundamental in addressing the security issues. This has been successful both for the physical security and the information systems security. Many governmental departments and organizations across the globe have used this device to monitor criminal activities of people. There have been many alternatives of surveillance methods that organizations have put in place to contain the security situations (Mitchel & Jolley, 2012). These techniques have been effective in some way. The enforcement of cyber laws in an attempt to prevent cyber crime has been very effective since it instills fear on the perpetrators. It has helped to curb issues of cracking that have been considered great vices to the running of information systems of a great many organizations. Furthermore the use of anti viruses has played an increasingly substantial role in dealing with the malicious software thereby ensuring that the data remains relevant, usable and applicable to the effective running of the organization. The use of surveillance technology has been very effective in curbing both the societal physical threats and those threats that involve the information systems in organizations. The use of CCTVs for example, has made it possible to monitor criminal activities of people, bringing them to book and ensuring that justice prevails for the victims and against the perpetrators. However, there have also been significant failures on part of these technologies and systems that have been put in place to curb the security threats. Information and communication technologies continue to change and develop at very unprecedented rates. Technologies used to curb security threats today may not be applicable tomorrow. This explains why the anti viruses must be constantly updated to guarantee their effectiveness. Many countries have come up with laws protecting the information systems and preventing cyber crime. Unfortunately, most of these laws have not been enforced effectively. There has not been a good will on part of the governments to enforce these laws and help individuals and organizations out of this bad situation (Mitchel & Jolley, 2012). The surveillance technologies have also come with new challenges making their use challenged in many parts of the globe. While some people support the technologies, others have reserved support arguing that nothing can be done to curb them. The surveillance technologies have therefore faced opposition from certain quarters especially from those who are cynical and pessimistic about its usage. Surveillance also inflicts certain negative psychological effects. It makes individuals feel like they are always being watched. This has led to its failure. Moreover, it has been argued that surveillance technologies lead to a breach of individuals’ right of privacy. This is considered a very fundamental right. As such, its success has been dwindling (Corgan, 2007). CHAPTER FIVE CONCLUSION AND RECOMMENDATIONS As long as people continue to live, there will always be security threats. With more and more inventions and advancement in the field of information and communication technologies, advancement of the security threats is also realized. It is therefore an initiative of every individual, organization and government to ensure that its information systems are very secure. While determining the kind of technologies to put in place to curb the security threats, the merits and demerits of such systems should be the driving forces in making the choices. The system ought to guarantee the security of both the individuals and the organizational data. Based on the findings of this research, it is recommended that cyber laws be strengthened and enforced to curb the security threats. There should be even more stringent and stern measures against the perpetrators of the cyber crime. Individuals should also be enlightened on the importance of security to minimize possible oppositions and ensure support for the technologies (Stoneburner, Hayden & Feringa, 2004). Organizations also need to back up their sensitive and significant data. Organizations need to give the first priority to the security of the information systems so that these vices do not slip undetected. Security threats should be rendered a thing of the past. All the parties involved in ensuring the security of individuals, data and information should continuously take a proactive role in ensuring that these issues are addressed effectively. REFERENCES Corgan, L. (2007). Doing Social Research. Lanham, MD: Rowman & Littlefield Publishers Ltd. Hall, R. (2008). Applied Social Research: Planning, Designing, and Conducting Real-World Research. Sydney: Palgrave Macmillan Ltd. Mitchell, M. L., & Jolley, J. M. (2012). Research Design Explained. Belmont, CA: Wadsworth Cengage Learning Ltd. Monahan, T. (2010). Surveillance in the Time of Insecurity. Piscataway, NJ: Rutgers University Press. Stoneburner, G., Hayden, C., & Feringa, A. (2004). Engineering Principles for Information Technology Security (A Baseline for Achieving Security), Revision A. Retrieved from: http://csrc.nist.gov/publications/nistpubs/800-27A/SP800-27-RevA.pdf. On 4 October 2012. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Effectiveness of Security Technology in Reducing Security Threats Research Paper”, n.d.)
Effectiveness of Security Technology in Reducing Security Threats Research Paper. Retrieved from https://studentshare.org/information-technology/1788192-effectiveness-of-security-technology-in-reducing-security-threats
(Effectiveness of Security Technology in Reducing Security Threats Research Paper)
Effectiveness of Security Technology in Reducing Security Threats Research Paper. https://studentshare.org/information-technology/1788192-effectiveness-of-security-technology-in-reducing-security-threats.
“Effectiveness of Security Technology in Reducing Security Threats Research Paper”, n.d. https://studentshare.org/information-technology/1788192-effectiveness-of-security-technology-in-reducing-security-threats.
  • Cited: 0 times

CHECK THESE SAMPLES OF Effectiveness of Security Technology in Reducing Security Threats

Risk Management

Given the constant security threats that our organization has continued to face, Cisco Security argent has effectively enabled our organization to overcome some of the vulnerabilities in its security systems.... Although CSA has been largely effective as security technology, it has a number of vulnerabilities that allow malicious attackers to carry out remove code executions on the network (Allen,2001).... As a security technology, CSA has also provided an efficient infrastructure that supports various network operations in the organization....
3 Pages (750 words) Essay

Balancing Effectiveness vs Efficiency within the Business

The organization realized that many business entities with huge capital bases required specialized protection service from the protective security firms.... This service required CPO's with a special kind of skill set which many security companies lacked.... These changes include reducing field managers by 50% and employ more Close protection officers with advanced qualification.... effectiveness on the other hand is associated with the business's ability to identify and embrace opportunities of business via exchange relationships....
12 Pages (3000 words) Essay

Define a Remote Access Policy to Support Remote Health Care Clinics

The systems administrators and the management need to realize that security threats are very critical emanate from the inside (Fisher, 2001).... Advances that have been made by technology in the recent past has enabled storage of large information amounts with limited expenses involved.... Unknown individuals may access private information a factor that makes availability of security policies an essentiality.... Programs of security awareness are designed in such a way to sensitize users on organization's security policy....
2 Pages (500 words) Essay

Macro Forces for International Marketing of China

This gives businesses the confidence of establishing and expanding their businesses as they are assured of enhanced security.... Though the tariffs in China are high, they have been drastically reducing over the past few years.... Corporations and firms are thus staking advantage of the many opportunities to create a market niche for themselves, and in the process, the value of competition… Different markets have different success and development chances and thus, before one makes a choice on the most suitable place for investment, it is pertinent to carry out a detailed analysis of the many factors that affect the success chances in a This report provides a macro analysis of China, one of the fastest growing markets in the world and which provides a suitable platform for a business to invest....
6 Pages (1500 words) Term Paper

Security Automation in oil and gas company

Topic Development: The topic of this study focus on a ‘researchable problem' and not to a ‘personal problem' as this view is based on the following facts: a) the security threats for the firms of oil and gas industry are many, b) most of these threats cannot be appropriately controlled due to the failures reported in the security systems used in the industry's firms and c) the importance of this problem has been highlighted by organizations, as explained in the first section of this proposal, but also by academic researchers....
2 Pages (500 words) Assignment

The Key Failure Points in the Tjx System

In conclusion some other threats that could have attacked Tjx may have included the following e.... Discuss how TJX's information systems and technology security could be improved or strengthened, distinguishing between short-term versus long-term priorities Some of the short-term security measures that could be improved or strengthened included working with all major credit and debit cards to help investigate some of the potential frauds, directly contacting customers whose information had been exposed in the time of the intrusion process, working with the law including the U....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us