logo

Information Technology Security Report 2022

   

Added on  2022-10-04

6 Pages1875 Words16 Views
 | 
 | 
 | 
Running head: REPORT ON INFORMATION TECHNOLOGY SECURITY
REPORT
ON
INFORMATION TECHNOLOGY SECURITY
Name of the Student
Name of the University
Author Note:
Information Technology Security Report 2022_1

IT Security1
Introduction:
The aim of this report is to discuss about the aspect of information technology
security with the purpose to analyze its essentiality, benefits as well as how this may
influence the services of the IT systems. Followed by this aspect it has been noticed that
several researches has been conducted in the aspect of IT security from which a research
paper has been selected based on the application of cloud computing into the IT system,
which consists on a detail elaboration on the security challenges as well as the encryption
techniques which are utilized in the application of cloud computing. In order to support the
above mentioned discussion this paper will effectively elaborate on the key findings which
has been identified from the research, followed by which it will also discuss about the
security issues which has been noticed in the field of Information Technology security. Along
with the above discussion it will also analyze the accuracy of the effectiveness of the selected
research paper. Lastly, it will conclude by summarizing the key aspects which has been
identified from the above discussion.
Discussion:
Followed by the objective of this paper, a thorough investigation on the features and
application of information technology has been conducted, which has provided a brief idea on
the essentiality of the IT systems into the organizational field. After the investigation it has
been noticed that information technology is nothing but a combination of storage, processors,
networking as well as other devices that helps to enhance the services of an organization by
incorporating effective technologies in it. After the incorporation of technologies, the
organizational activities are performed via the utilization of electronic devices. Followed by
the above mentioned application several benefits has been accounted into the server of IT
system which holds a significant impact on enhancing the performance of an organization.
Those benefits includes the effective data storage process due to which the organizational
information are stored in IT system which provide effective services like data sorting, data
processing as well as helps to make effective decision as well. Along with being performance
efficient these technologies are cost effective as well, as it reduces the human efforts and
speed up the business activities. [1] However, apart from these benefits in the application of
IT systems there are several limitations present as well which includes the security of the
information. Considering the current industrial growth as well as the growth of security issues
it has been noticed that there are several significant challenges present in the application of
effective IT systems in to the business services as it may harm the organizational assets.
Information Technology Security Report 2022_2

IT Security2
Followed by the above discussion the select paper is based on the cloud computing security
challenges and encryption process as in the current growth of technology cloud computing
holds a significant impact on enhancing the performance of the organizations. While
elaborating the nominated topic it has been noticed that cloud computing is a computing
service which includes the effective software, analytics feature, networking, database storage
as well as includes the server that works via internet, which offers effective computing
services and innovations as well. [2] Hence, after investigating the benefits of cloud
computing it has been noticed that cloud is one of the most cost effective technology that
provide resources on demand, speed ups the business services, holds effective scalability,
enhances the productivity, reliability, performance as well as the security of the organization.
However, followed by the above discussion security concerns of cloud computing has been
discussed in the selected research paper. [3]
According to the selected research paper cloud computing is one of the most trending
technology which is currently utilized by several organization due to its on-demand feature
which helps to expand the storage capacity as well as other resources as per their needs.
However, cloud computing holds significant issues related to its security features, which has
been highlighted by several researchers. Hence, in this research paper the aspect of cloud
security mechanism has been significantly focused in order to provide appropriate mitigation
strategy to address the identified risk related to IT security. Followed by this aspect the
researcher has mention that since, cloud computing is based on distributed pattern thus there
it with by interconnecting the computing resources with the purpose to enhance the services
of an organization. Followed by this several operational issues has been identified which
includes the security issues, cloud service issues as well as the issues related to the cloud
security issues. While describing the security issues it has mentioned that since, cloud server
works with the real time data which consist of important information related to the users and
organization it has several significant risk has been identified which may influence the
information issue, information privacy issue, security issue, trust issues as well as the issues
related to the application of cloud infrastructure into the organization. [4] Followed by this
the researcher has elaborated each of the issues by stating that data issues are nothing but the
issues related to the data availability, accessibility as well as the data integrity. Considering
these identified aspect on the issues of information explains that in cloud computing these are
the common conflicts which happens in the organizational infrastructure. Similar to this
privacy issues are those due to which cloud infrastructure experiences data leakage,
Information Technology Security Report 2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Enterprise and Cloud Computing in Banking Industry
|8
|1721
|371

Report on Cloud and Enterprise Computing
|8
|1834
|138

Critical Analysis of Data Security in Cloud Computing
|7
|1990
|80

The Role of Nist in Cyber Security Under Fisma Essay 2022
|5
|938
|23

IOT AND CLOUD COMPUTING ANALYSIS 2022
|4
|617
|25

Information Technology 2022 Report
|12
|4826
|26