logo

IT Security & Technology Landscape | Assignment

6 Pages1206 Words80 Views
   

Added on  2020-03-16

IT Security & Technology Landscape | Assignment

   Added on 2020-03-16

ShareRelated Documents
Running Head: IT SECURITY1IT SecurityStudent’s NameInstitution
IT Security & Technology Landscape | Assignment_1
IT SECURITY2ContentsIntroduction.................................................................................................................................................2IT Security & Technology Landscape...........................................................................................................2IT Models & Access Controls.......................................................................................................................3IT Security Threat & Risk Assessment..........................................................................................................3Conclusion...................................................................................................................................................4References...................................................................................................................................................4
IT Security & Technology Landscape | Assignment_2
IT SECURITY3IT SecurityIntroductionIT Security which is also known as cyber or computer security is the process or actions performed to ensure computer systems are protected from damage or theft in regard to the information they hold and the hardware and software in which they use. IT security and the technology landscape refer how IT security is implemented and maintained based on the technology practices and resources available. IT security models are schemes which are providedto aid in enforcing and specifying security policies (Katsicas, 2009). Access control is the act of restricting access to a system or resource and only allowing a few individuals who have been authorized to access the system. IT security threat and risk assessment is the process or act of performing a risk assessment to establish to what degree a system is at threat or being breached or accessible to unwanted parties.IT Security & Technology LandscapeIT Security refers to the protection of systems to avoid misdirection or disruption as they provide their services. IT security and the respective technology landscape covers various spheres. Vulnerabilities are weaknesses which are identified and exploited in a systems design and used to enable an individual gain access to the system. The act of gaining access to a system without authorized access is known as vulnerability exploitation (ISACA, 2006). There are various systems which have been developed to help secure systems. The current technological landscape has been improving to ensure that systems are kept safer (Pipkin, 2000). Though there are new vulnerabilities being discovered and exploited, the technological landscape is improving to ensure that they are being patched so that malicious individuals will not be able to exploit
IT Security & Technology Landscape | Assignment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Concepts of IT Security and the Technological Landscape Model Report
|7
|1248
|54

ITC 596 -IT Risk Management | Assignment
|8
|1569
|49

ITC596 | IT Risk Management
|8
|1612
|104

IT Risk Management : Assignment
|7
|1669
|112

IT Security & Technology Landscape : Assignment
|10
|1862
|58

Managing and Resolving the Different Levels of Risk
|15
|5492
|94