logo

Information Systems Security

   

Added on  2023-05-26

5 Pages791 Words494 Views
INFORMATION SYSTEMS SECURITY
0

INFORMATION SYSTEMS SECURITY
1
Introduction
In this modern era, the security of information technology is one of the biggest
challenges and many companies are facing this issue because they use unauthentic
servers and networks. IBM is an international business machine which is an American
organization that provides information technology to their consumers (Ahmad,
Maynard, & Park, 2014). But this organization is facing the problem of cyber-crimes for
which they are required to develop the information security architecture. The objective
of this report is to design and analysis the security architecture for IBM organization
and understands the IT security fundamentals.
Physical Security Architecture
It is observed that between 2015 and 2017 the use of information technology has
increased by 68% which also increased the rate of cyber-crimes or hacking. To enhance
the security of employees and consumer personal data security architecture will be
created for IBM by which they can control and manage the unauthentic servers and
networks. For which there are main two advanced technologies can be used such as
authentication and cryptographic by which IBM can improve the security of their
computer networks.
Figure: IT architecture for IBM organization
Web-based interference
Gateway
Authorization
service
manager (IBM) Authentication
services
Application
firewall
Data/Information
Cryptographic services: applied to all devices

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture
|5
|747
|57

Network Security: Report on OSI Security Architecture and Cryptographic Algorithms
|16
|2776
|371

Crypto Currency and Cyber-Crime: Types of Malware, Mitigation Tools and Processes
|14
|919
|105

Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491

Understanding Security and Cybersecurity: Threats, Breaches, and Protection Measures
|5
|1404
|493

Cyber Security and IT Infrastructure: Challenges and Solutions
|4
|723
|396