Comprehensive Analysis of IT Security and Technology Landscape

Verified

Added on  2020/02/19

|7
|1577
|294
Report
AI Summary
This report delves into the dynamic realm of IT security and the evolving technology landscape. It begins by examining the shift towards cloud computing and its impact on IT infrastructure, highlighting the need for careful migration strategies and vendor relationship management. The report then addresses the growing threat of cybercrime, including the rise of ransomware, botnets, and phishing attacks, analyzing their methods and impact on individuals and organizations. Furthermore, it explores the specific security challenges faced by the energy sector, emphasizing the importance of remote access security and providing practical recommendations for mitigating vulnerabilities. The report references several studies to support its analysis and provides insights into the current and future state of IT security.
Document Page
Running head: IT SECURITY & TECHNOLOGY LANDSCAPE
IT Security & Technology Landscape
Name of the Student
Name of the University
Author note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
IT SECURITY & TECHNOLOGY LANDSCAPE
For building and maintaining the traditional form of the IT, environments are very costly
(Miller et al., 2014). Therefore, there are hardware and the servers, implementation of the change
in the infrastructure of the management, installing the software, maintaining the posture and the
proper security services, providing the robust of the development and testing the environments
that are responding to the business that highly demands the quicker form of the dedicated and the
skilled staffs of the IT (. While there are several common place for the models of the several
shops of the IT, the technologies implemented by cloud that have begun to make the difference
for making the serious forms of the inroads for changing the way in which the shops of IT
operates (Miller et al., 2014). These are some of the way in which the technologies of the clouds
are changing in a rapid manner.
The major forms of impact of the cloud computing models are on the infrastructures of
the IT. For the process of migrating the models that are been carefully considered as there are the
hardware and the software that are affected by the internal way in which the IT firms processes
and therefore this process should implement the change in the relationships with the vendors
(Webber & Vincenti, 2016).
For companies that have a stringent regulatory-driven IT environment, such as banks or
insurance companies, the change to using cloud resources requires a well thought out plan on
how IT can respond to future industry changes due to political and economic situations.
There has been a steady amount of growth in the number of the “ransomware’ Trojans
that are been used for trying to extort the money for the individual users. These encrypted
programs are being the data of the victim that are displayed as a message that asks the victim
Document Page
2
IT SECURITY & TECHNOLOGY LANDSCAPE
about the transfer of the money to the author of the programme that are using transfer of the
money that are payee through the services of internet payment (Asplund & Nadjm-Tehrani,
2016).
However, there are computer that are there for the combined form into the networks. The
activities that are performed in these bot networks or the botnet those are being using in the
websites or in the accounts of the Twitter (Denning, Kohno & Levy, 2013). However, if the
botnet have any sort of the single command servers and it is possible for taking it down once in
their location that has been identified. Nevertheless, in the recent years the cybercrimes have
been developed in a more complex form of the botnets that can be employed in the model of peer
for avoiding any sort of failure (Denning, Kohno & Levy, 2013). The Storm Worm that was
e3stablished in the early 2007 has been the pioneer for this method, it has been, and there has
been a huge number of implementation of the botnets since then. However, it has been until few
years back when there has been the most numbers of the epidemics that are involved in the
worms that are being hijacked for the mail systems for the distribution in a proactive manner for
harvesting the additional form of the contacts that are being infected by the machines as they
have the tendency to fade. Now it has become the trend to have the increasing amount of the
malicious programmers who are deliberately being spammed to the victim machines.
The rapid usage of the malicious form of the code have been the only form of the method
that have been used by the cyber criminals for gathering the data that are personal for making a
large amount of money in an illegal way. The phishing involves the tracking of the people and
disclosing their personal identities like their Pin codes, ID details, passwords etc. These hackers
then use these details for the money under the influence of the false pretence. The phishers can
create a duplicate account of the person and can use the legitimate logos, make references and
Document Page
3
IT SECURITY & TECHNOLOGY LANDSCAPE
good form of the business styles. They also spoofs the headers of the email and make it looks
like that it has come from the legitimate form of the bank.
There are various fake emails that are been distributed by the phisers that have one of the
common thing that they are a bit used to the phenomenon and they sort of lure the customers into
clicking on the links that are provided in the message. Therefore, they tend to unwittingly hand
over all of the information that are needed by the cybercriminals for accessing the account of the
people and steal their money (Kuehn & Ljunggren, 2014).
The energy sectors have their own way to lead their way for securing the critical form of
the assets that are being used for sharing the information about the access that are remote for
gaining the best form of practices and the technologies that can be helpful for mitigating the
impacts of the potential form of the cyber attacks . The numbers of the security measures have
been implemented by the energies of the companies that are to be extended into the other forms
of the industries, and in fact, there are some of the measures that are some of the measures that
are part of the other form of the standards (Kuehn & Ljunggren, 2014).
However, for protecting the organization from the threats that are associated from the
remote access, the considerations of the implementation of the following practices are addressed
for the connectivity vulnerabilities (Van den Bergh, Thijs & Viaene, 2014). The first step
involves the identification of the remote from of the users, accounts and the associated form of
the credentials. Secondly, the individuals should have the process to lock their credentials.
Thirdly, there should a minimization of the direct connections to the critical form of the assets.
Fourthly, the individuals should not trust anyone, but they need to always verify their accounts.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
IT SECURITY & TECHNOLOGY LANDSCAPE
Lastly, they should have the facility to deploy various analytical tools. Therefore, these are some
of the techniques that can be use to minimize the security risks.
Document Page
5
IT SECURITY & TECHNOLOGY LANDSCAPE
References
Miller, R. J., Lavenberg, R. A., & MacKay, I. A. (2014). ERISA: 40 Years Later: The Landscape
of Retirement Security Has Changed Dramatically since ERISA Was Enacted 40 Years Ago, as
the Three-Legged Stool of Pensions, Savings, and Social Security Has Broken Down. Journal of
Accountancy, 218(3), 86.
Webber, A. B., & Vincenti, F. (2016). An Update on Calcineurin Inhibitor–Free Regimens: The
Need Persists, but the Landscape has Changed. Transplantation, 100(4), 836-843.
Wahl-Jorgensen, K., Williams, A., Sambrook, R., Harris, J., Garcia-Blanco, I., Dencik, L., ... &
Allan, S. (2016). The Future of Journalism: Risks, threats and opportunities.
Asplund, M., & Nadjm-Tehrani, S. (2016). Attitudes and perceptions of iot security in critical
societal services. IEEE Access, 4, 2130-2138.
Denning, T., Kohno, T., & Levy, H. M. (2013). Computer security and the modern
home. Communications of the ACM, 56(1), 94-103.
Bizikova, L., Roy, D., Swanson, D., Venema, H. D., & McCandless, M. (2013). The water-
energy-food security nexus: Towards a practical planning and decision-support framework for
landscape investment and risk management. Winnipeg, Manitoba: International Institute for
Sustainable Development.
Skopik, F., Settanni, G., & Fiedler, R. (2016). A problem shared is a problem halved: A survey
on the dimensions of collective cyber defense through security information sharing. Computers
& Security, 60, 154-176.
Document Page
6
IT SECURITY & TECHNOLOGY LANDSCAPE
Kuehn, D., & Ljunggren, S. (2014). Refining a Network Model Concerning Network Security
Risk Analysis.
Shi, Q., Liu, Y., Zuo, J., Pan, N., & Ma, G. (2015). On the management of social risks of
hydraulic infrastructure projects in China: a case study. International Journal of Project
Management, 33(3), 483-496.
Van den Bergh, J., Thijs, S., & Viaene, S. (2014). Transforming Through Processes: Leading
Voices on BPM, People and Technology. Springer Science & Business Media.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]