StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Information Technology Security - Coursework Example

Comments (0) Cite this document
Summary
This coursework "Information Technology Security" describes different types of attacks and the main aspects of security. This paper outlines the main computer-related attacks, data-related attacks, network-related attacks, access-related attacks, and different challenges. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
Information Technology Security
Read Text Preview

Extract of sample "Information Technology Security"

Download file to see previous pages This is especially with regard to the increasing methodologies that can be employed by crackers to attack the information system of an organization.
Different attack methodologies can be employed by a cracker to attack an organization whose information technology is not secure. There are four broad methodologies that can be used and these forms the four common offenses as regards attacks on the systems of information of an organization. These are computer-related attacks, data-related attacks, network-related attacks, and access-related attacks. All these four types of attacks have significant negative effects on the objectives of that particular organization in possession of the information system.
These would be broadly categorized as industrial espionage and software piracy including other forms of infringement on copyright (Gelbsten & Kamal, 2002). The industrial espionage has been enhanced by the establishment of a worldwide network such as the internet. This has made it possible for professional crackers to obtain and destroy information of organizations. The crackers can equally be able to use the internet to have access to the salaries that the staff of an organization is paid. Through the internet, hackers can equally steal the commercial strategies of an organization. These strategies can be sold to the competitors of the said organization so as to enhance their strategies and outdo those ones. Under software piracy and the infringement of copyright, the attacker will develop a copy of the software used by a company and then distribute it to other people. This type of piracy emerged in the early 1990s especially with the development of personal computers and laptops. This type of piracy also occurs in many countries worldwide. The types of software which can be pirated in a company include packages for financial accounting; computer-aided design and toolboxes as well as workshops for digital photography among others (Pesante, 2008).  ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Information Technology Security Coursework Example | Topics and Well Written Essays - 1750 words, n.d.)
Information Technology Security Coursework Example | Topics and Well Written Essays - 1750 words. https://studentshare.org/information-technology/1881341-information-technology-security
(Information Technology Security Coursework Example | Topics and Well Written Essays - 1750 Words)
Information Technology Security Coursework Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/information-technology/1881341-information-technology-security.
“Information Technology Security Coursework Example | Topics and Well Written Essays - 1750 Words”. https://studentshare.org/information-technology/1881341-information-technology-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Information Technology Security

INFORMATION TECHNOLOGY: SURVEILLANCE SECURITY

...Information Technology Security... Information Technology Security... The report demonstrates a typical surveillance system for an organization, in order to protect the critical information assets from physical theft, unauthorized access, and natural disasters. Consideration is given to IP camera based surveillance systems, biometric systems for attendance and logging employee activity, Intrusion Detection systems for advanced security and enforcing access policies by active directory. Introduction Due to recurrent technological developments, information and communication technology frequently diverts in new dimensions. The research and development in the context of information and communication technology is very effective. Moreover, the new and ...
8 Pages (2000 words) Assignment

Technology of Information Security

...Information Technology Security... Information Technology Security... Technology of Information Security Technology of Information Security Introduction The use of cryptography is a necessity for the consequence of the revolution of information in the world today. Electronic communications is widely used and to make conversations very confidential, cryptography gives the solution for the problem though it has been majorly spawned by a serious debate (Mel and Baker, 2000). The technique has been in existence for a long time but is not yet fully reliable thus posing a danger to all the information that is shared via the internet. Methods of encryption are on the rise because of the rapid growth in the technology sector all over the world. As...
3 Pages (750 words) Essay

Information Technology Security

...Information Technology Security... Information Technology Security... Information Technology and Security Introduction CIA de s confidentiality of information, integrity of information, and availability of information. Information bears significant value, especially in the contemporary business world. The protection of such information as bank account statements, credit card numbers, personal information, government documents, and trade secrets remain a critical part of information security. Confidentiality of information relates to safeguarding of information from disclosure to unauthorized parties (Feruza and Kim 2007, pp.19). Some of the dominant means of managing confidentiality on systems encompass access control lists, traditional Unix file ...
3 Pages (750 words) Essay

Information Technology Security

...Information Technology Security... Information Technology Security... Technology Security Submitted by: XXXXX XXXXXXX Number: XXXXXXXX of XXXXXXXX XXXXXXXX XXXXXXXXX Subject Code: XXXXXXX Date of Submission: XX – XX – 2009 Number of Words: 3892 (Excluding References) Table of Contents Table of Contents 1 Introduction: 2 What is Computer Related Crimes: 3 Types of Computer Related Crimes: 4 Conclusion: 14 References 16 In the world today where much depends upon computers and their associated networks, computer –related crime appears to becoming a major problem. Describe and analyse the range of computer related crimes and, based on this analysis, offer up some effective countermeasures. Introduction: Over the past few decades technology has grow...
15 Pages (3750 words) Essay

The impact of Compliance on an organisations existing information technology security

...Information Technology Security... Information Technology Security... Head: Research paper Impact of Compliance on an organization’s existing Information Security Policy of the of the Institution] [Name of the Professor] [Course] Abstract Transcending to information age has presented a lot many challenges in front of decision makers. One such challenge is the protection and security of data and information crucial to business processes and its overall existence. The research paper tries to explore the importance of Information Security and its subsequent compliance by an organization. Compliance is actually a process and not a destination. How the need for compliance arose and what reasons made it mandatory for an organization to implement form ...
20 Pages (5000 words) Research Paper

Technology of Information Security

...Information Technology Security... Information Technology Security... OF INFORMATION SECURITY Technology of Information Security Affiliation At the present, the majority of business organizations use a distributed computing environment to store their data and information. In this scenario, their data and information are stored in different locations. For instance, in many cases data and information are kept on a centralized server. On the other hand, some organizations prefer to store their data in the decentralized data storage system. In this scenario, each user is individually responsible for managing and updating his own data on his own computer. However, the most commonly used scenarios at the present are a mixture of these two solutions,...
2 Pages (500 words) Essay

Information Technology- Security

...Information Technology Security... Information Technology Security... technology- Security Information technology- Security Information Assurances Information assurance describes the measures that organizations take to protect and restore the quality of information in a bid to enhance the reliability of its sources. According to Herold & Rogers (2011), the concept has many dimensions that include completeness, validity, steadfastness, timeliness, integrity and confidentiality. In organizations, the protection of information from unauthorized access and alteration is the main aim of information assurance. As such, the appropriate use of information helps in securing organizations from risks. In the United States, records concerning the use of...
2 Pages (500 words) Research Paper

Information Technology Security

...Information Technology Security... Information Technology Security... Paper Access Controls for SpiderWeb Methodology for information ought to be controlled through a method that ensures the client access rights for SpiderWeb which reflect characterized and recorded business needs and employment prerequisites. All clients must be identifiable, work necessities ought to be appended to client personalities, access benefits for every framework and information gathering should be recognized, and access rights must be in accordance with characterized and reported business needs and it should reflect the ideas of minimum benefit and isolation of obligations (SAMPEMANE 62-65). Access Provisioning Associations ought to have a powerful process for recogniz...
11 Pages (2750 words) Essay

Information Technology Security Risk

...Information Technology Security... Information Technology Security... Evaluating Risk Analysis 1.1 Threats Threats are defined as the probable network security breach which may occur in the future and will harm the network, as well as Information systems. The current trends in technology advancement have enabled the networks to be prevalent. People are connected at home, offices, as well as when they are travelling either via laptop or mobile phones. The evaluation is conducted to identify the severity of each information system, which deserves priority due to the value of data which needs to be protected. Both threats and vulnerabilities need to be considered concurrently. Threats can provide damage to the confidentiality, availability and inte...
13 Pages (3250 words) Research Paper

Information Technology: Surveillance Security

...Information Technology Security... Information Technology Security... The report demonstrates a typical surveillance system for an organization, in order to protect the critical information assets from physicaltheft, unauthorized access, and natural disasters. Consideration is given to IP camera based surveillance systems, biometric systems for attendance and logging employee activity, Intrusion Detection systems for advanced security and enforcing access policies by active directory. Introduction Due to recurrent technological developments, information and communication technology frequently diverts in new dimensions. The research and development in the context of information and communication technology is very effective. Moreover, the new and a...
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Information Technology Security for FREE!

Contact Us