This report discusses the security architecture for IBM organization to enhance the privacy of personal data or information. It covers physical security architecture, application firewall, authentication services, authorized services, and cryptographic technology.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
INFORMATION SYSTEMS SECURITY 0 Information Systems Security
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INFORMATION SYSTEMS SECURITY 1 Introduction In this modern era, the security of information technology is one of the biggest challenges and many companies are facing this issue because they use unauthentic servers and networks. IBM is an international business machine which is an American organization that provides information technology to their consumers (Ahmad, Maynard, & Park, 2014).But this organization is facing the problem of cyber-crimes for which they are required to develop the information security architecture. The objective of this report is to design and analysis the security architecture for IBM organization and understands the IT security fundamentals. Physical Security Architecture It is observed that between 2015 and 2017 the use of information technology has increased by 68% which also increased the rate of cyber-crimes or hacking. To enhance the security of employees and consumer personal data security architecture will be created for IBM by which they can control and manage the unauthentic servers and networks. For which there are main two advanced technologies can be used such as authentication and cryptographic by which IBM can improve the security of their computer networks. Figure: IT architecture for IBM organization Web-based interference Gateway Authorization service manager (IBM)Authentication services Application firewall Data/Information Cryptographic services: applied to all devices
INFORMATION SYSTEMS SECURITY 2 (Source: By author) The information technology security architecture for IBM is divided into main four parts which are the following: ï‚·Application firewall ï‚·Authentication services ï‚·Authorized services ï‚·Cryptographic technique Application firewall Firewall is an advanced technology that has the potential to identify and detect unwanted signals from computer networks. This technique can be used for IBM because it deals with large computer servers and collects data from various resources for which management team can handle such issues by using this approach (Farooq, Waseem, Khairi, & Mazhar, 2015). Authentication services It is a kind of process which is used to identify the authentic individuals to access their personal devices and if it is not authentic than this approach analysis and block them. With the help of this approach management team of IBM can control the login attempts and handle the issue of cyber-crime. Authorization services It is one of the best processes which are used by many organizations in their security architecture which is defined as a technique of granting access to data and stipulating the action which can be done on that data (Layton, 2016).For example, IBM Company can set up folders in which they stored their reports and data files for which they can use the authorization process to secure these folders. Cryptographic technology It is the final step of security architecture that control and monitor the whole computer network of IBM and it has the ability to detect the malware from computer devices. This technique converts the information or data into a form of code which cannot be hacked by an attacker without their permission (Soomro, Shah, & Ahmed, 2016).So, IBM can adopt such a process to handle the issue of cyber-threats and by using this approach individuals can enhance their efficiency and privacy of personal data files. Conclusion This report designed and implemented security architecture for the IBM organization by which they can enhance the privacy of their personal data or information. Employees should ensure that they use only authentic networks and
INFORMATION SYSTEMS SECURITY 3 servers and keep update software on a regular basis that can increase the security of their data.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
INFORMATION SYSTEMS SECURITY 4 References Ahmad, A., Maynard, S. B., & Park, S. (2014). Information security strategies: towards an organizational multi-strategy perspective.Journal of Intelligent Manufacturing,25(2), 357-370. Farooq, M. U., Waseem, M., Khairi, A., & Mazhar, S. (2015). A critical analysis of the security concerns of the internet of things (IoT).International Journal of Computer Applications,111(7). Layton, T. P. (2016).Information Security: Design, implementation, measurement, and compliance. Auerbach Publications. Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs a more holistic approach: A literature review.International Journal of Information Management,36(2), 215-225.