logo

Information Technology Security

   

Added on  2023-06-08

6 Pages1284 Words242 Views
 | 
 | 
 | 
Running Head: INFORMATION TECHNOLOGY SECURITY
Information Technology Security
Name of the Student
Name of the University
Author Note
Information Technology Security_1

2
INFORMATION TECHNOLOGY SECURITY
PART I
Traditional Security impacts
Traditional security is defined as physical set of security features that ensures the fact
equipment’s that are needed to conduct management tasks are safe and no harm can be caused to
them. Most effective traditional security technology that is being used in today’s society is
closed circuit television. Importance of closed circuit television is that the processing of each add
every details that is done under the surveillance of the camera is recorded. This helps in
preventing any kind of misconduct that can be done by imposters. This helps in disclosing truth
behind any kind of misconduct that is performed during the time of cross training. In case during
cross training any employee performs any kind of misconduct, their activities will be recorded in
the Closed circuit television. This ensures the fact that no employees can do any unjustified work
inside the office premises. Misconducts namely stealing of equipment’s on which they are
working is one of the most common factors. To reduce this kind of activities Closed circuit
television is used. Introduction to technological change incurs the fact that new appliances will
be brought in and old appliances will be off loaded. During offloading of old appliances,
unauthorized access has been the major reason for loss of capital during technological exchange.
Introduction of Closed Circuit Television has drastically reduced this kind of issues after its
introduction. Alarming systems can also be considered to be one of the most important factors.
This technology ensures the fact that in case of unauthorized access to certain appliances alarm
will ring which will help the security system of the organization to get alert and take active steps
in the process.
Information Technology Security_2

3
INFORMATION TECHNOLOGY SECURITY
Information security impacts
Information security is mostly concerned with the data that is stored in the database of the
system. This ensures the fact that data processing is performed in a safe manner. Installing
firewall is one of the most common way to secure the data that is stored in the database of the
organization. During the time of cross training the major issue of the organization is that the data
that is stored in the processing of data is stolen by imposters. This ensures the fact that the data
that is stored in database is encrypted before the transaction, this helps the data to stay protected
from the imposters as the imposters needs to encrypt the data before gaining access ti the same.
This increases the robustness of database is which the data is being stored. Decryption of the data
stored in database is only possible by demodulating the data as per the modulating stature of that
particular data. During the time of cross training employees get access to data that are stored and
created by other department of the same organization. This ensures the fact that in case any
imposter’s wants to get access to data of other department can easily get access to the same. To
mitigate this kind of problem, the step that is taken by organization is that portal of every
individual is created and access of every individual is protected. This acts as the major process
that organizations to get hold of the imposters who wants to access data in an unauthorized
manner. This is the major that proves the impact of Information technology in the field of
management and security systems.
PART II
Vulnerabilities of new technologies
Vulnerability of technologies that are incorporated from the traditional approach like Closed
circuit camera is that it does not support privacy to the employees who are working in this
project. This is one of the major problem that arises in the course of usage of Closed circuit
Information Technology Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Benefits of Maintaining a Database for Efficient Event Planning
|12
|3036
|399

Information Security Management Case Study 2022
|4
|646
|34

Analysis of Information Security Technologies
|7
|1186
|223

Assignment on Physical Security3
|5
|739
|16

Enabling Fine-Grained Access Control Over Encrypted Data
|3
|824
|16

Security Measures and Obsolescence Mitigation for Costly Inventories and Equipment Spare Parts
|9
|1555
|323