Comprehensive Analysis of Information Security: Threats and Solutions

Verified

Added on  2023/06/10

|9
|2178
|407
Essay
AI Summary
This essay provides an overview of information security, highlighting the evolution of computer systems and the increasing importance of data protection. It delves into system security, discussing key concepts such as confidentiality, integrity, and availability, along with various malware threats including DDOS attacks, spyware, viruses, SQL injection attacks, and ransomware. The essay also outlines essential steps for preventing data breaches, such as creating strong passwords, installing firewalls, using antivirus software, and implementing secure authentication systems. Furthermore, it explores future trends in information security, including the potential of iris scanners, retina scanners, artificial intelligence, and machine learning technologies to enhance system protection. The essay concludes by emphasizing the need for continuous improvement in security measures to mitigate data loss and protect sensitive information, encouraging the use of original software and adherence to security protocols for optimal system safety. Desklib provides access to similar solved assignments for students.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: INFORMATION SECURITY
Information Security
Name of the student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1INFORMATION SECURITY
Table of Contents
Introduction:...................................................................................................................2
System Security..............................................................................................................2
Future Treads.................................................................................................................5
Conclusion......................................................................................................................6
References......................................................................................................................7
Document Page
2INFORMATION SECURITY
Introduction:
People have been fond of the computer system since the late 1950,s and there have
been a lot of changes in the computer systems till then. Late then the computer used to be in
big size and small in function, also the system lacked serious security issue. Although the size
of the machines used to big in size the function that the computer had were very poor. This
was one of the major problem as it took lot of space to keep the system. With time the
computer evolved as the knowledge of the system evolved (Peltier 2016). Now the computer
systems that we possess are lot smaller and can do huge works. In terms of the security, the
computer systems are some of the most secured systems in the world. Information security
have become one of the most important thing that is been done in the modern systems. The
term information security denotes that a system must be secured from any the authorised
entry especially from the electronic devices. Strict measures has to be taken in order to
protect the information and many of the systems are made especially for the purpose of
protection of data.
System Security
Keeping a system secured is one of the most important thing is to be in the in today’s
world. There are a number of threats that have been attacking the computer systems (Siponen,
Mahmood & Pahnila, 2014). There have been number of cases where it has been seen that a
computer system which is full of secured information is hacked by many of the hackers and
data have been stolen form the machines.
Many of the scientists like the Tuna, (2017) states the information security can be sub divided
in three subparts namely
Document Page
3INFORMATION SECURITY
Confidentiality- Confidentially mentions that the data must be protected from
unauthorised user accesses. Ensuring proper confidentiality ensures that information
are safe and secured form the outside world.
Integrity: Data integrity can be explained as the process to ensure that data is safe
enough from being modified by unauthorised users (Soomro, Shah & Ahmed, 2016).
This in order to make data secure one has to ensure data is properly integrity.
Availability: Availability can be explained as the step where the right user must have
the access to use the right information at the right time. Making sure this step is one of
the major process and needs to be properly implemented.
According to Gan, et al (2014) there are a number of viruses and malware attacks attempts
made to many of the systems. Some of the major malwares that attacks the computer systems
area:
DDOS attack: The DDOS attack or the Distributed Denial Of service attack is one of
the most common attack these days. The main form of this attack is in the servers and
networking sources (Lee et al., 2017). The form of the attack is it floods the system
with huge number of incoming messages or connections requests in form of the
malware packets which targets the system forces to slow down and even crash at
times denies the verified user to use the system. According to Pathan, (2016) this is
one of the major problem these days and is a huge threat to the information security.
Malware: The malwares is a kind of malicious software that hackers use for different
purposes. The software does processes like the stealing of user data, blocking of
systems, injecting files that corrupts the computer systems, encrypting the computer
system. Other than this the malwares also injects files that duplicates itself and fills up
the memory of the computer systems (PITCH et al., 2015). This is one of the most
common form of virus.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4INFORMATION SECURITY
Spyware: A spyware is a form of malware that helps the hackers to keep an eye on the
victim computer system. This is one of the most dangerous form of virus which can
affect a computer system. These bots steals information related to banks like the card
details, account details, social media details among others.
Viruses: The viruses are similar to the malwares and does things same to the
malwares (Papp, Ma, & Buttyan, 2015). The most common form of virus is a Trojan
horse which specialises in replicating itself in the victim computer system. Thus
making one of the major problem for the users of the system.
SQL injection Attacks: The Sql Injection can be explained as a security exploit which
helps the attacker to change the details of the databases through the standard quarry
languages. The hacker enables codes with the help of the browsers by making the
changes in the HTML codes of the web pages. This is one of the major problems as
many a times it have been seen that the amount of the data is increased though
redundancy by hackers making huge problems for the database managers.
Ransome ware Attacks: These are the most dangerous malware attacks that are ever
made by the hackers. Under this system hackers use high end encryption system to
encrypt the victims’ computer system and in exchange of the providing the key to
decrypting the system asks for huge sum of money in exchange. There have been a
numerous number of this type of attacks. One of the most affected was the attack was
made by the wannacry malware.
Information security is one of the most important thing that have be done by any user for
the safekeeping of data. If proper steps to prevent attacks are not made then there are
chances of huge data threats (Shameli-Sendi, Aghababaei-Barzegar & Cheriet, 2016). In
organisational level serious steps must be taken in order to protect data form hackers and
Document Page
5INFORMATION SECURITY
crackers in order to make thee working procedure safe and secure. Some of the basic
steps for the process of preventing of data are:
Creating Strong Passwords: One must create strong passwords for preventing
hackers stealing data and protecting information.
Installing firewalls: Installing firewalls is like putting a security guard in the
network system. Enabling the firewall clan help the system to detect things that
are unusual and enhance the computer security.
Antivirus: An antivirus system is a software that is specially made for the purpose
of ensuring proper security to the systems. The work of this systems is to ensure
that it detects any disables any possible threat to made by any hacker. In the
modern times these type of software have become very much powerful and
hackers are trying hard to disable this type of securities.
Using Original and Authenticated software: It is often seen that people use pirated
software which opens up pathways for hackers to access data. One of the major
fault is using pirated Windows, this is one of the most dangerous mistake that is
made by many of the users which the hackers use as opportunity.
Using strong Authentication systems: Using a secured authentication and
encryption for the computer systems can help reduce the attack chances in a
system. In organisation state it has be done in a very proper manner as security is
one of the most important thing that has to be done.
Future Trends
Layton, (2016) says that in the coming future it can be said that a number of changes
that will be coming will enhance the security systems of the computer systems that we own
today. Some of the major changes that are being developed are the Iris Scanners, the retina
Scanner which can changes the world on computer logical security. Other than this the
Document Page
6INFORMATION SECURITY
introduction of the Artificial Intelligence and the Machine Learning Technologies can also
boost up the changes in the world of the computer systems. This system can help in the
proper patching of the systems with the modern technologies and hence can boost up the
security services of the systems. Other than this developing a common language for all the
programing concepts can help in reducing the hacking chances.
Conclusion:
Thus concluding the topic, it can be said Information security is one of the most
important thing that is to be considered. If there is no any proper information security system
in the computer systems, servers it can cost a lot to the individual. Proper steps must be taken
in order to enhance the security of the systems so that there is no loss. There is a need where
to follow the steps of the confidentiality, integrity and availability of the subject devices and
data are some of the most. It is to be ensure that original software is used for the proper
security of the system device. It has be ensured in the future the technologies that are been
developed must be used in a proper way so that the amount of the data loss to the hackers are
reduced. It can be said that what kind of attacks can come in future.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7INFORMATION SECURITY
References:
Gan, C., Yang, X., Liu, W., Zhu, Q., Jin, J., & He, L. (2014). Propagation of computer virus
both across the Internet and external computers: A complex-network
approach. Communications in Nonlinear Science and Numerical Simulation, 19(8),
2785-2792.
Layton, T. P. (2016). Information Security: Design, implementation, measurement, and
compliance. Auerbach Publications.
Lee, J., Yoo, B., Lee, H., Cha, G. D., Lee, H. S., Cho, Y. ... & Kang, M. (2017). Ultra‐
wideband multi‐Dye‐sensitized upconverting nanoparticles for information security
application. Advanced Materials, 29(1), 1603169.
Papp, D., Ma, Z., & Buttyan, L. (2015, July). Embedded systems security: Threats,
vulnerabilities, and attack taxonomy. In Privacy, Security and Trust (PST), 2015 13th
Annual Conference on (pp. 145-152). IEEE.
Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, WSN, WMN,
VANET. CRC press.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines
for effective information security management. Auerbach Publications.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines
for effective information security management. Auerbach Publications.
PITCH, M. A., UBIQUITY, C. T., AN, B., YAFEE, P., STUCKEY, J., ANDERSEN, E., &
SAHA, G. K. (2015). Information security.
Document Page
8INFORMATION SECURITY
Shameli-Sendi, A., Aghababaei-Barzegar, R., & Cheriet, M. (2016). Taxonomy of
information security risk assessment (ISRA). Computers & security, 57, 14-30.
Siponen, M., Mahmood, M. A., & Pahnila, S. (2014). Employees’ adherence to information
security policies: An exploratory field study. Information & management, 51(2), 217-
224.
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs
more holistic approach: A literature review. International Journal of Information
Management, 36(2), 215-225.
Tuna, G., Kogias, D. G., Gungor, V. C., Gezer, C., Taşkın, E., & Ayday, E. (2017). A survey
on information security threats and solutions for Machine to Machine (M2M)
communications. Journal of Parallel and Distributed Computing, 109, 142-154.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]