Information Systems Security

Verified

Added on  2023/05/26

|5
|791
|494
AI Summary
This report discusses the security architecture for IBM organization to enhance the privacy of personal data or information. It covers physical security architecture, application firewall, authentication services, authorized services, and cryptographic technology.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
INFORMATION SYSTEMS SECURITY
0
Information Systems Security

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INFORMATION SYSTEMS SECURITY
1
Introduction
In this modern era, the security of information technology is one of the biggest
challenges and many companies are facing this issue because they use unauthentic
servers and networks. IBM is an international business machine which is an American
organization that provides information technology to their consumers (Ahmad,
Maynard, & Park, 2014). But this organization is facing the problem of cyber-crimes for
which they are required to develop the information security architecture. The objective
of this report is to design and analysis the security architecture for IBM organization
and understands the IT security fundamentals.
Physical Security Architecture
It is observed that between 2015 and 2017 the use of information technology has
increased by 68% which also increased the rate of cyber-crimes or hacking. To enhance
the security of employees and consumer personal data security architecture will be
created for IBM by which they can control and manage the unauthentic servers and
networks. For which there are main two advanced technologies can be used such as
authentication and cryptographic by which IBM can improve the security of their
computer networks.
Figure: IT architecture for IBM organization
Web-based interference
Gateway
Authorization
service
manager (IBM) Authentication
services
Application
firewall
Data/Information
Cryptographic services: applied to all devices
Document Page
INFORMATION SYSTEMS SECURITY
2
(Source: By author)
The information technology security architecture for IBM is divided into main four
parts which are the following:
Application firewall
Authentication services
Authorized services
Cryptographic technique
Application firewall
Firewall is an advanced technology that has the potential to identify and detect
unwanted signals from computer networks. This technique can be used for IBM because
it deals with large computer servers and collects data from various resources for which
management team can handle such issues by using this approach (Farooq, Waseem,
Khairi, & Mazhar, 2015).
Authentication services
It is a kind of process which is used to identify the authentic individuals to access
their personal devices and if it is not authentic than this approach analysis and block
them. With the help of this approach management team of IBM can control the login
attempts and handle the issue of cyber-crime.
Authorization services
It is one of the best processes which are used by many organizations in their
security architecture which is defined as a technique of granting access to data and
stipulating the action which can be done on that data (Layton, 2016). For example, IBM
Company can set up folders in which they stored their reports and data files for which
they can use the authorization process to secure these folders.
Cryptographic technology
It is the final step of security architecture that control and monitor the whole
computer network of IBM and it has the ability to detect the malware from computer
devices. This technique converts the information or data into a form of code which
cannot be hacked by an attacker without their permission (Soomro, Shah, & Ahmed,
2016). So, IBM can adopt such a process to handle the issue of cyber-threats and by
using this approach individuals can enhance their efficiency and privacy of personal
data files.
Conclusion
This report designed and implemented security architecture for the IBM
organization by which they can enhance the privacy of their personal data or
information. Employees should ensure that they use only authentic networks and
Document Page
INFORMATION SYSTEMS SECURITY
3
servers and keep update software on a regular basis that can increase the security of
their data.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INFORMATION SYSTEMS SECURITY
4
References
Ahmad, A., Maynard, S. B., & Park, S. (2014). Information security strategies: towards an
organizational multi-strategy perspective. Journal of Intelligent
Manufacturing, 25(2), 357-370.
Farooq, M. U., Waseem, M., Khairi, A., & Mazhar, S. (2015). A critical analysis of the
security concerns of the internet of things (IoT). International Journal of
Computer Applications, 111(7).
Layton, T. P. (2016). Information Security: Design, implementation, measurement, and
compliance. Auerbach Publications.
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs
a more holistic approach: A literature review. International Journal of
Information Management, 36(2), 215-225.
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]