logo

IT-373 - Report on IT Security

11 Pages2410 Words51 Views
   

Monroe College

   

IT Networking Security (IT-373)

   

Added on  2020-02-24

About This Document

IT-373  - Report on IT Security, This report highlights IT security as witnessed in different settings of the digital world. In fact, a detailed analysis is given on the security concepts of technology and the threats/risk it faces. Technology landscape: from the inception of information technology, the industry has always envisioned transformative operational architecture by continuously shifting the landscape of information access. In essence, this shift has continuously moved IT infrastructure from mainframe systems (architectures) to client/server systems.

IT-373 - Report on IT Security

   

Monroe College

   

IT Networking Security (IT-373)

   Added on 2020-02-24

ShareRelated Documents
Running head: IT RISK MANAGEMENTAssessment 1 [Student Name Here][Institution’s Name Here] [Professor’s Name Here][Date Here]
IT-373 - Report on IT Security_1
IT RISK MANAGEMENT2Table of ContentsContents PageIntroduction........................................................................................3IT security and technology Landscape..............................................................3Threats and vulnerabilities.............................................................................4Mitigating the risks.........................................................................................5Benefits of these mitigations..........................................................................5IT security threats and risk assessment.............................................................6IT security Threats and risk............................................................................7Mitigation.......................................................................................................8Benefits...........................................................................................................8Conclusion...........................................................................................9References .................................................................... 10
IT-373 - Report on IT Security_2
IT RISK MANAGEMENT3IntroductionInformation technology has introduced new concepts of meeting organizational objectives,these concepts use automated technologies that facilitate the analysis of information todevelop better and conclusive decisions. Moreover, the same concepts enhance riskmanagement by providing factual results that facilitate users to make better future decisions.However, information technology stands as an important asset on its own and will facevarious problems, more so, security threats and vulnerabilities. These threats will stem fromillegal access as propagated by intruders who use these assets to further their illicit courses.Moreover, the threats are also caused by system vulnerabilities which are caused by userignorance or by developer’s faults[ CITATION Sto02 \l 2057 ]. This report highlights IT securityas witnessed in different settings of the digital world. In fact, a detailed analysis is given onthe security concepts of technology and the threats/risk it faces.IT security and technology LandscapeTechnology landscape: from the inception of information technology, the industry has alwaysenvisioned on transformative operational architecture by continuously shifting the landscapeof information access. In essence, this shift has continuously moved IT infrastructure frommainframe system (architectures) to client/server systems[ CITATION OCL10 \l 2057 ]. In thepast, this was achieved by personalised computers which were served by mainframe systemsaccessed using client/server applications. However, the modern technological landscape sees’direct access to information where portable devices use different units of Softwares to accessdata, the so called apps. Therefore, irrespective of the industry or field, the technologylandscape seems to acquire a common pattern where the end users, who lack technical ICTknowledge, are at liberty to access extensive technological systems. This outcome raisesmany security challenges as outlined below.
IT-373 - Report on IT Security_3
IT RISK MANAGEMENT4Fig: Technology landscape and IT security Threats and vulnerabilitiesTo assess the threats facing the modern landscape of technology, one must demystify theelements of IT. For one, there are three main elements, hardware, software and the users. Hardware threats: In 2011 Dell, a computer system manufacturer, announced to the worldthat its servers had been attacked by powerful malicious malware. This attack was unique innature as it affected a critical aspect of technology, the motherboard system. This malicioussoftware had embedded itself into the flash memory of the servers used in the company.Now, in the past, such attacks were only done on the firmware (application) and were easy tomanage, however, this attack singled a new threat that affected physicalcomponents[ CITATION Deh16 \l 2057 ]. Software: most of the security threats experienced today are focused on firmware elementswhere malicious codes infect devices and alter their operation modes. This outcome is furtherintensified today because of the internet which provides endless connections that intruderscan use to attack[ CITATION Lia11 \l 2057 ]. Furthermore, the advances in software developmentUser vulnerabilities: poor authentication, old application, internet access etc.UserData loss, Data breach, Illegal access DataHardware attacks and software attacksMalware, intrusions, DOS and MIM etc Infrastructure
IT-373 - Report on IT Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ITC596 - IT Risk Management | Report
|11
|2081
|107

Internet-Based Applications and Security Concerns
|8
|1182
|470

Network Security and Types of Security Threats and Attacks in Information Technology
|8
|2577
|274

Threats, Attacks and Malware in IT Security - Desklib
|12
|1198
|192

Proactive Network Defence
|19
|5232
|130

IT Security: Types of Risks, Organizational Procedures, Impact of Firewall Configuration, Implementation of DMZ, Static IP and NAT
|18
|1181
|61