Information Technology Security Issues Report - University Context

Verified

Added on  2022/10/10

|3
|555
|185
Report
AI Summary
This report delves into the critical domain of information technology security, examining the threats that can compromise businesses and universities. It highlights the risks associated with malware, social media attacks, and vulnerabilities within network systems. The report emphasizes the importance of implementing robust security measures, such as firewalls, anti-virus software, and Intrusion Detection and Prevention Systems. It also addresses the need for educating users about account protection and utilizing digital certifications. Furthermore, the report references the National Institute of Standards and Technology's Cybersecurity Framework as a valuable tool for risk identification. It concludes by suggesting a range of solutions, including application monitoring, VPN solutions, and advanced detection and prevention tools to safeguard data. The report also provides a critical perspective on the use of VPN solutions and their potential vulnerabilities.
Document Page
RUNNING HEAD: INFORMATION TECHNOLOGY SECURITY ISSUES 0
Information Technology Security Issues
STUDENT’S DETAILS-
11/1/2019
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INFORMATION TECHNOLOGY SECURITY ISSUES 1
Information technology security issues are the threats that can cause harm to the software
of the business and can cause potential harm to the pertinent information of the business.
Besides, in today’s business, there are issues such as the malwares and social media attacks that
can be a danger for the business due to the weak security setting at the business. These settings
require safe practices and tools that are needed to be undertaken to avoid the cyber threats and
stealing of the confidential information. This setting involves the setting up of the firewall and
anti-virus software that alerts the businesses from the viruses and the malware infections and any
other third party entries (Global Sign, 2018). As in case of the University setting, a pair of
firewall that are needed to be installed into the protection of the website from the infectious
viruses and for increased safety and reliability. Apart from this, the installation of the Intrusion
Detection and Prevention System can help in the protection of the wired and non-wired networks
from the security threats.
Moreover, there are security issues for the university setting as the issues of the worms
and malwares into the networks that can infect the computer and the private data of the students.
Thus, there are tools and prices that are undertaken the staff of the university for increasing the
wealth of the security services. For that, the university has to educate the university community
about the account and system protection and requesting a digital certification for the protection
against the security issues such as viruses, hackers or the any other security threats (Yilmaz &
Yalman, 2016). Also, National Institute of Standard and Technology’s Cyber security
Framework can be used by the university effectively for the identification of the risk relating to
the security. Utilizing of the robust security measures can help the university in avoidance of the
threats (Joshi & Singh, 2017). Application monitoring, VPN solutions, installation of the
network firewall and use of the advanced detection and prevention tools can prevent the data of
the university setting and the students. Also, installation of VPN solutions may not always keeps
the connection safe as it also leads to the website vulnerabilities that can increase the chances of
getting infected even after the successful installation of the VPN.
Document Page
INFORMATION TECHNOLOGY SECURITY ISSUES 2
References
Global Sign. (2018, August 28). Six Cybersecurity Tools and Services Every Business Needs.
Retrieved November 1, 2019, from Global Sign Blog:
https://www.globalsign.com/en/blog/six-cybersecurity-tools-and-services-every-business-
needs/
Joshi, C., & Singh, U. (2017). Information security risks management framework–A step
towards mitigating security risks in university network. Journal of Information Security
and Applications, 25, 128-137.
Yilmaz, R., & Yalman, Y. (2016). A comparative analysis of university information systems
within the scope of the information security risks. TEM Journal, 5(2), 180.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]