logo

IT Security & Technology Landscape

   

Added on  2020-03-02

7 Pages1766 Words78 Views
Running head: IT RISK MANAGEMENT1IT risk managementNameInstitution Affiliation:

IT RISK MANAGEMENT2IT Security & Technology LandscapeIntroductionThe technology has always been accompanied by the changes. Some of these changes have just small but they impact on specific sector, but others are major and impact everyone (Erl, Puttini &Mahmood, 2013). There are various questions which arises as a result of technology landscape which will be examined as follows;How the IT landscape changed The IT landscape has changed in various ways such as facilitating on the business monetization. This has been due to the mobile technology, thus enabling the business to monetize more than ever. Additionally, the technology landscape has enabled the facilitation of interaction through the business apps (Erl, Puttini & Mahmood, 2013). This has been prior to the internet, the customer and the business interact such as through the social media sites. There has also been rise of the cloud which has been significant to many business today to an extent the average user can retrieve data from anywhere when they access the internet (Safa, 2017). The technology landscape has changed also particularly in the supporting of the business security. The new threats in the IT landscape Some of the threats associated with the information technology landscape are confidentiality, integrity and availability. Confidentiality is equivalent to privacy. The measures which are undertaken in order to ensure confidentiality are designed to prevent sensitive data from reachingwrong individuals (Page, 2017). Integrity entails maintain the consistency, accuracy as well as the trustworthiness of the data over the entire life cycle. The data should not be changed in the transit, and steps needs to be taken in order to ensure the information cannot be altered by

IT RISK MANAGEMENT3individuals who are not authorized. On the other hand availability is ensured through maintenance of all the hardware repair immediately when they are needed as well as maintainingcorrectly the functioning operating system environment (Page, 2017). In the development of the security to ensure that the authorized parties only are able to access the data when they need there is need to use the CNSS security model. This model ensure ensures that there is establishment and evaluation of the information security in the development of the secure system(Safa, 2017). It is important to develop security goals and it is vital to know how these goals relates to the various states. Conclusion The technology landscape has been the set of hardware as well as the software which serves fabrics to support on all the business operation of the companies. The technology has encountered various risks such as the confidentiality, integrity and availability. These risks couldbe mitigated through cystography for ensuring there is data integrity and it include hashing the data received. On the availability there should a backup done that is the key. Through the regulardoing of the off-site backups could limit the damage that is caused to hard drives. References Erl, T., Puttini, R., & Mahmood, Z. (2013). Cloud computing: concepts, technology & architecture. Pearson Education.Page, E. H. (2017). Modeling and Simulation (M&S) Technology Landscape. In Guide to Simulation-Based Disciplines (pp. 25-35). Springer, Cham.Safa, N. S. (2017). The information security landscape in the supply chain. Computer Fraud & Security, 2017(6), 16-20.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
CLOUD COMPUTING AND DEPLOYMENT MODEL
|7
|810
|16

ITC596 | IT Risk Management
|8
|1612
|104

CSC8419 - Cryptography and Security: Assignment 1
|8
|2184
|78

ITC596 - IT Risk Management | Report
|11
|2081
|107

IS Security and Risk Management
|17
|4121
|102

IT Security and Risk Management | CNSS Security Model
|6
|1362
|197