Retrieved from https://studentshare.org/management/1492764-research-project-yt-information-security
https://studentshare.org/management/1492764-research-project-yt-information-security.
Threats to information security often gain access to the information stored in computer systems and manipulate the data and information rendering it meaningless and useless to the owners of the information while in some cases benefiting the sources of the information security threats (Stephen, et al, 106). As technology advances with time, so does the various threats to information security. There is therefore great need to develop strong information security mechanisms to respond to the emerging threats.
This essay seeks to explain one of the most prevalent threats to information security that has been one of the main security problems since 2010. A research conducted in 2010 showed that malware infections were among the most notable security problems to computer information systems. This essay will describe the menace of malware infections and provide the various available ways of controlling it. Development of information security strategies protecting complex data and information across a wide network while also improving system performance as well as ensuring easy data retrieval when necessary is one of the most challenging tasks in network design (Halliday).
This is even made worse by the porous and complex nature of modern transactions and the increasing demand for safe and secure information storage and retrieval mechanisms. The process of securing and protecting information refers to defending data and information from unauthorized access, disclosure, modification, inspection, use or destruction. Information security includes protection of all forms of information and data including both physical and electronic forms (Stephen, et al, 160). Information security encompasses four main areas that aim at safeguarding the whole integrity of the information collected and stored for future retrieval.
These are availability of the data and information on demand, confidentiality, accountability on the part of individuals charged with the responsibility of managing the information, and data integrity (Stephen, et al, 167). A security authentication process refers to the process of determining he individuals authorized to access, retrieve, alter and use information at specified times and in a specified manner. The authentication process involves putting in place measures to determine which individuals are ratified to access the information stored.
Malware Infection One of the most common information security problems that was very prevalent in 2010 is malware infection. Malware infections refer to attacks to information systems by malicious software applications that intrude the system and alter the data and information stored in it (Barnet). There are several types of malicious software application that can intrude an information system. Some of them are very complicated to deal with once they get in to the system and can lead to complete loss of data in the system.
Some of the most common malware include rootkits and botnets (Stephen, et al, 142). Botnets can be described as a collection of programs linked via internet, which communicate with other programs so as to perform certain tasks. Botnets are usually used as malicious software programs across the internet to perform functions such as sending spam e-mails and participating in DDos attacks that can affect information systems (Stephen, et al
...Download file to see next pages Read More