StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Information Technology Threats and Security - Assignment Example

Comments (0) Cite this document
Summary
From the paper "Information Technology Threats and Security" it is clear that The threats are explored like a virus, malware, malicious activities, etc. some prevention techniques are also discussed and observed for implementation. The need for a single unified tool is highlighted…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Information Technology Threats and Security
Read Text Preview

Extract of sample "Information Technology Threats and Security"

Download file to see previous pages There are many effective antivirus and internet security software that detect the latest threats. The software has updates on a daily basis, first suggestion can be to purchase a very effective antivirus and internet security software and install that on all machines and scan all the computers with this software. After scanning if any threat is found it deletes that threat from the system.

Most of the threats spread in computers via the internet and network that’s why it is essential to analyze the network or internet traffic. For this purpose, different ways are used in the most efficient way that can be suggested is a firewall. A firewall is a software or it can be a hardware-based security system, which analyzes network incoming and outgoing data whether it is secure or not based on different rules that are set inside this. For network data transfer TCP and UDP protocols are used and these protocols transfer data using specific ports, and each port has its own unique port number, firewall reads the network packets from these ports and if there is any unsecured data then it is rejected and secure data is communicated between computers. The firewall also prevents from the hacking of the computer.

According to requirements, a stateful or stateless firewall can be installed on computers for network security. A stateless firewall is more efficient and fast as compare to the stateful firewall and it requires less memory, but in some cases, if the user wants to see history or logs then the stateful firewall is a good option.

The firewall works on mostly three OSI model layers, most of the work is done between the physical layer and network layer; and the transport layer is only used for finding the destination and source port numbers. Therefore, Kemmerer and Vinga (2002) stated that installing the firewall was a good idea for any network computers from threats and hacking.
Systems are designed for the security and reliability for getting progressive in the industry and perform accurately. ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Information Technology Threats and Security Assignment Example | Topics and Well Written Essays - 1500 words, n.d.)
Information Technology Threats and Security Assignment Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/information-technology/1812439-it-threats-and-security
(Information Technology Threats and Security Assignment Example | Topics and Well Written Essays - 1500 Words)
Information Technology Threats and Security Assignment Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1812439-it-threats-and-security.
“Information Technology Threats and Security Assignment Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/information-technology/1812439-it-threats-and-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Information Technology Threats and Security

Technology of Information Security

...Information Technology Threats and Security... Information Technology Threats and Security... Technology of Information Security Technology of Information Security Introduction The use of cryptography is a necessity for the consequence of the revolution of information in the world today. Electronic communications is widely used and to make conversations very confidential, cryptography gives the solution for the problem though it has been majorly spawned by a serious debate (Mel and Baker, 2000). The technique has been in existence for a long time but is not yet fully reliable thus posing a danger to all the information that is shared via the internet. Methods of encryption are on the rise because of the rapid growth in the technology sector all...
3 Pages (750 words) Essay

Information Technology Security

...Information Technology Threats and Security... Information Technology Threats and Security... Information Technology and Security Introduction CIA de s confidentiality of information, integrity of information, and availability of information. Information bears significant value, especially in the contemporary business world. The protection of such information as bank account statements, credit card numbers, personal information, government documents, and trade secrets remain a critical part of information security. Confidentiality of information relates to safeguarding of information from disclosure to unauthorized parties (Feruza and Kim 2007, pp.19). Some of the dominant means of managing confidentiality on systems encompass access control...
3 Pages (750 words) Essay

Common Information Security Threats

...Information Technology Threats and Security... Information Technology Threats and Security... Common Information Security Threats Introduction The purpose of computers and other network systems is to facilitate information exchange; today, organizations are managed using computer network. This requires respective organizations to implement the use of password and user name; however, such mechanism creates channels for committing computer crimes. Attackers invent ways of hacking passwords, and steal information from different organizations. At the present, organizations face a number of security threats (Whitman, 2003), this paper explores the information security threats facing Apple Inc. Information Security threats According to Grimes (2012),...
3 Pages (750 words) Essay

Information Technology Security

...Information Technology Threats and Security... Information Technology Threats and Security... Technology Security Submitted by: XXXXX XXXXXXX Number: XXXXXXXX of XXXXXXXX XXXXXXXX XXXXXXXXX Subject Code: XXXXXXX Date of Submission: XX – XX – 2009 Number of Words: 3892 (Excluding References) Table of Contents Table of Contents 1 Introduction: 2 What is Computer Related Crimes: 3 Types of Computer Related Crimes: 4 Conclusion: 14 References 16 In the world today where much depends upon computers and their associated networks, computer –related crime appears to becoming a major problem. Describe and analyse the range of computer related crimes and, based on this analysis, offer up some effective countermeasures. Introduction: Over the past few dec...
15 Pages (3750 words) Essay

Technology of Information Security

...Information Technology Threats and Security... Information Technology Threats and Security... OF INFORMATION SECURITY Technology of Information Security Affiliation At the present, the majority of business organizations use a distributed computing environment to store their data and information. In this scenario, their data and information are stored in different locations. For instance, in many cases data and information are kept on a centralized server. On the other hand, some organizations prefer to store their data in the decentralized data storage system. In this scenario, each user is individually responsible for managing and updating his own data on his own computer. However, the most commonly used scenarios at the present are a mixture of ...
2 Pages (500 words) Essay

Information Technology- Security

...Information Technology Threats and Security... Information Technology Threats and Security... technology- Security Information technology- Security Information Assurances Information assurance describes the measures that organizations take to protect and restore the quality of information in a bid to enhance the reliability of its sources. According to Herold & Rogers (2011), the concept has many dimensions that include completeness, validity, steadfastness, timeliness, integrity and confidentiality. In organizations, the protection of information from unauthorized access and alteration is the main aim of information assurance. As such, the appropriate use of information helps in securing organizations from risks. In the United States, records...
2 Pages (500 words) Research Paper

Information Technology Security

...Information Technology Threats and Security... Information Technology Threats and Security... Paper Access Controls for SpiderWeb Methodology for information ought to be controlled through a method that ensures the client access rights for SpiderWeb which reflect characterized and recorded business needs and employment prerequisites. All clients must be identifiable, work necessities ought to be appended to client personalities, access benefits for every framework and information gathering should be recognized, and access rights must be in accordance with characterized and reported business needs and it should reflect the ideas of minimum benefit and isolation of obligations (SAMPEMANE 62-65). Access Provisioning Associations ought to have a power...
11 Pages (2750 words) Essay

Information Security Risk and the Possible Threats to Information Security

...Information Technology Threats and Security... Information Technology Threats and Security... Information is the processed data that helps managers and other officers in an organization to make decisions (Borchgrave 2001). It is therefore important that it should be handled with care throughout processing and storage. Information security is a very essential necessity in an organization or company. This is accomplished through various technical measures and strategies. In order to come up with viable solutions, it is important to identify the possible threats to the security of information then design the solutions based on the problems and the weaknesses identified (Kairab 2004). Information is treated according to the level of management accord...
7 Pages (1750 words) Research Paper

Information Technology: Surveillance Security

...Information Technology Threats and Security... Information Technology Threats and Security... The report demonstrates a typical surveillance system for an organization, in order to protect the critical information assets from physicaltheft, unauthorized access, and natural disasters. Consideration is given to IP camera based surveillance systems, biometric systems for attendance and logging employee activity, Intrusion Detection systems for advanced security and enforcing access policies by active directory. Introduction Due to recurrent technological developments, information and communication technology frequently diverts in new dimensions. The research and development in the context of information and communication technology is very effective....
8 Pages (2000 words) Assignment

Information Technology Security

...Information Technology Threats and Security... Information Technology Threats and Security... TECHNOLOGY SECURITY by + Table of Contents INFORMATION TECHNOLOGY SECURITY 3 Introduction 3 Computer-related Attacks 3 Data-related Attacks 5 Network-related Attacks 6 Access-related Attacks 8 Conclusion 8 References and Bibliography 9 INFORMATION TECHNOLOGY SECURITY Introduction The Internet Control Message Protocol (ICMP) remains one of the greatest achievements of the twenty first century. From nascent begins in the 1960s, the world has witnessed astronomical leaps in the development of computer technology. A single computer can contain huge volumes of information within a miniature hard drive. However, the emerging information insecurity in organizat...
7 Pages (1750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Information Technology Threats and Security for FREE!

Contact Us