logo

IT Security Risks and Solutions for Organizations

   

Added on  2023-04-26

15 Pages4389 Words158 Views
Security

SECURITY
1
Table of Contents
Introduction...........................................................................................................................................2
Assess risks to IT security.......................................................................................................................2
Part 1.................................................................................................................................................2
Security risks, security legislation, and methods...........................................................................2
Types of security technologies.......................................................................................................4
Part 2.................................................................................................................................................5
DMZ network.................................................................................................................................5
Static IP..........................................................................................................................................5
NAT network..................................................................................................................................5
Review mechanisms to control organisational IT security and Manage organisational security...........6
Part 1.................................................................................................................................................6
Part 2.................................................................................................................................................8
Information security Policy............................................................................................................8
Part 3...............................................................................................................................................10
Conclusion...........................................................................................................................................11
References...........................................................................................................................................12

SECURITY
2
Introduction
Security of data is one of the crucial steps for any organization due to which they can
suffer from security threats and risks. Security is about protecting organizational data,
assets risks, and threats, and private details of employees (Warkentin, and Willison,
2009). This report aim is to analyse the security risks faced by an organization,
highlights the solution to address the security risks and threats and impact of the
security breaches on the business continuity. This report is categorised into major five
parts such as assess risks to IT security, information security solutions, types of security
threats in the world, design and implement a security policy, and role of stakeholders
for the implementation of the security audit recommendations.
Assess risks to IT security
Part 1
According to the given scenario, the leading security organization is facing the security-
related issues and risks that affect the performance of their networks and business. As
an information security engineer, the security of data is very complex in this modern era
because companies are using the internet connectivity that associated with the hacking
and data breaches (Colwill, 2009). To train junior staff members in order to control and
manage the security risks the company should provide the complete education and
training to their employees.
Security risks, security legislation, and methods
There are numbers of security risks, security legislation and methods are associated
with the Company IT networks which are described below:
Computer virus
It is very common security risks that faced by the organization and hackers send the
viruses from their network to company private server. In which attackers produce the
unwanted signals and viruses through complex algorithm methods like malicious and
enter into the company server by which they can reduce the performance of the system
(Sabahi, 2011).

SECURITY
3
Adware and spyware
Adware is defined as software which is used by the hackers in order to track data and
information of the company. Mainly, they collect the relevant data of organization
through internet browsers and social media. Spyware is very similar to the adware but
such kind of software is installed into the company computer devices without their
permission and blocks their private details.
DOS attack
DOS is the denial of service attack which occurs due to lack of security and unauthentic
channels. In this attack criminals first develop huge amounts of traffic and links through
the malicious method and transfer them on organization personal network.
To control and manage these security risks there are numerous security legislation and
methods are developed which are the following:
The EU general data protection regulation
California consumer privacy act
SEC guidance
NYCRR part 500
Changing state regulation
There are few steps and methods that can be used for the given scenario in order to
reduce the security risks:
Use only authentic servers and networks
Block and identify the spam and fraud links
Adopt firewall and encryption methods
Keep data secure through backup plans
Ensure that employees should turn on security tools and software
Designing and implementing the security framework and policy is one of the best
methods to assess and treat the IT security risks. The security framework involves few
steps such as identify risk, analyse risk, evaluating risk and planning for reducing
security risks. It is observed that the trusted network is a part of IT security solution
because many employees use the third party application and unauthentic servers which

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security Threats and Control Measures for Open University Malaysia
|10
|3121
|88

Smartphones Security Issues and Mitigation Tools
|10
|706
|305

Network Security: Protecting the Integrity and Usability of Networking Services and Data
|25
|1420
|50

Malware Attack and Malware Analysis: A Research
|9
|2293
|146

Cyber security Report 2022
|12
|2352
|20

Understanding Access Control in Cyber Security
|24
|9360
|80