Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture

Verified

Added on  2023/05/26

|5
|747
|57
AI Summary
The field of computer science is concerned with the security of data. Cybersecurity protects hardware, software, computer networks, and personal data. Learn about IT security fundamentals, common vulnerabilities, and IBM's security architecture. Protect your data with advanced networks and techniques.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Information Systems Security
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INFORMATION SYSTEMS SECURITY
1
IT security fundamental
In the field of computer science, the security of data is one of the biggest concern
and many companies are facing such an issue. To avoid such issue information
technology develops a new approach that is cyber security which protects the
hardware, software, computer networks and personal data. In the last two years the
rate of security threats has increased by 40% due to lack of security and this rate is
growing very fast. There are many IT security fundamentals involves in the area of
information security which are the following:
Threat Analysis and classification
Auditing and penetration testing
Vulnerability assessment
Attack vectors terminology
Risk assessment
Common vulnerabilities with an IT infrastructure
There are many threats and vulnerabilities occur with information technology
infrastructures which are described below:
Legacy software
DDOS attack
Malware
Phishing
Ransomware
Wanna cry attack
Configuration conflict issue
The operating system works on a legacy software system which lack sufficient
consumers and system authentication and data verification. Due to use of unauthentic
servers consumers can lose their personal details.
DDOS is defined as the distributed denial of service attack that occurs when any
person uses fraud links and unwanted signals. In which hackers send traffic signals on
Document Page
INFORMATION SYSTEMS SECURITY
2
the network of consumers and hack their personal data or information (Yan Qian,
Sharif, & Tipper, 2012).
Malware is a kind of software that generates unauthentic networks and spam links
which are transferred to the computer networks of consumers. Many hackers use this
step to block the personal devices of consumers and hack their private details (Von
Solms, & Van Niekerk, 2013).
Phishing is a kind of security threat that occurs when any person clicks on the fraud
links and use third party applications which are developed by the hackers. In which
hackers send spam emails to consumers and enter into their computer devices to
encrypt their personal data files.
Recommendation and mitigation tools
It is recommended that the issue of security can be reduced by adopting advanced
networks and techniques like encryption, firewall and many more (Ericsson, 2010).
Recently information technology developed many approaches and methods to address
the cyber-threats and vulnerabilities which are the following:
Firewall and antivirus
Adopt encryption and cryptography technology
Use only authentic networks
Update software on a regular basis
Analysis of a security architecture of IBM
IBM is one of the largest business industries in the world which deals with
information technology products. To improve the security of their data or information
IT team developed a security infrastructure which is flexible and compatible with the
security model. There are following techniques involves in the architecture of IBM:
IBM Cognos authentication servers
IBM authorization services and networks
Cryptographic technology
IBM Congo’s Firewall
Document Page
INFORMATION SYSTEMS SECURITY
3
Figure: IT architecture of IBM
(Source: IBM, 2014)
IBM firewall process validates and filters the incoming and outgoing unwanted
or traffic signals at the dispatcher layer.
Authentication is a kind of method to identify consumers before allowing them
to log on.
An authorization service is mainly used to detect the traffic signals and
unauthentic servers from computer networks by which the issue of cyber-crime can be
resolved.
Cryptography provides a platform to increase the privacy of personal
information and also ensure that IBM congas BI communication and personal data are
secure or private.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INFORMATION SYSTEMS SECURITY
4
References
IBM (2014). Security Architecture, Available from
https://www.ibm.com/support/knowledgecenter/en/SSEP7J_10.1.1/com.ibm.s
wg.ba.cognos.crn_arch.10.1.1.doc/c_arch_security.html
Ericsson, G. N. (2010). Cybersecurity and power system communication—essential
parts of a smart grid infrastructure. IEEE Transactions on Power Delivery, 25(3),
1501-1507.
Von Solms, R., & Van Niekerk, J. (2013). From information security to
cybersecurity. computers & security, 38, 97-102.
Yan, Y., Qian, Y., Sharif, H., & Tipper, D. (2012). A survey on cybersecurity for smart grid
communications. IEEE Communications Surveys and Tutorials, 14(4), 998-1010.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]