IT SECURITY & TECHNOLOGY LANDSCAPE.

Added on -2020-02-19

| 7 pages| 1577 words| 29 views

Trusted by 2+ million users,
1000+ happy students everyday

Showing pages 1 to 3 of 7 pages

Running head: IT SECURITY & TECHNOLOGY LANDSCAPE
IT Security & Technology Landscape
Name of the Student
Name of the University
Author note
1
IT SECURITY & TECHNOLOGY LANDSCAPE
For building and maintaining the traditional form of the IT, environments are very costly
(Miller et al., 2014). Therefore, there are hardware and the servers, implementation of the change
in the infrastructure of the management, installing the software, maintaining the posture and the
proper security services, providing the robust of the development and testing the environments
that are responding to the business that highly demands the quicker form of the dedicated and the
skilled staffs of the IT (. While there are several common place for the models of the several
shops of the IT, the technologies implemented by cloud that have begun to make the difference
for making the serious forms of the inroads for changing the way in which the shops of IT
operates (Miller et al., 2014). These are some of the way in which the technologies of the clouds
are changing in a rapid manner.
The major forms of impact of the cloud computing models are on the infrastructures of
the IT. For the process of migrating the models that are been carefully considered as there are the
hardware and the software that are affected by the internal way in which the IT firms processes
and therefore this process should implement the change in the relationships with the vendors
(Webber & Vincenti, 2016).
For companies that have a stringent regulatory-driven IT environment, such as banks or
insurance companies, the change to using cloud resources requires a well thought out plan on
how IT can respond to future industry changes due to political and economic situations.
There has been a steady amount of growth in the number of the “ransomware’ Trojans
that are been used for trying to extort the money for the individual users. These encrypted
programs are being the data of the victim that are displayed as a message that asks the victim
2
IT SECURITY & TECHNOLOGY LANDSCAPE
about the transfer of the money to the author of the programme that are using transfer of the
money that are payee through the services of internet payment (Asplund & Nadjm-Tehrani,
2016).
However, there are computer that are there for the combined form into the networks. The
activities that are performed in these bot networks or the botnet those are being using in the
websites or in the accounts of the Twitter (Denning, Kohno & Levy, 2013). However, if the
botnet have any sort of the single command servers and it is possible for taking it down once in
their location that has been identified. Nevertheless, in the recent years the cybercrimes have
been developed in a more complex form of the botnets that can be employed in the model of peer
for avoiding any sort of failure (Denning, Kohno & Levy, 2013). The Storm Worm that was
e3stablished in the early 2007 has been the pioneer for this method, it has been, and there has
been a huge number of implementation of the botnets since then. However, it has been until few
years back when there has been the most numbers of the epidemics that are involved in the
worms that are being hijacked for the mail systems for the distribution in a proactive manner for
harvesting the additional form of the contacts that are being infected by the machines as they
have the tendency to fade. Now it has become the trend to have the increasing amount of the
malicious programmers who are deliberately being spammed to the victim machines.
The rapid usage of the malicious form of the code have been the only form of the method
that have been used by the cyber criminals for gathering the data that are personal for making a
large amount of money in an illegal way. The phishing involves the tracking of the people and
disclosing their personal identities like their Pin codes, ID details, passwords etc. These hackers
then use these details for the money under the influence of the false pretence. The phishers can
create a duplicate account of the person and can use the legitimate logos, make references and

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Premium

$45

Q&A Library Access

Chat support

12

Document Unlocks

4

Answer Unlocks

Students who viewed this