ISY10212 Report: Information Technology Security Analysis
VerifiedAdded on 2022/08/13
|12
|3523
|18
Report
AI Summary
This report analyzes the safety of information technology, addressing various aspects of IT security. It begins with an executive summary highlighting the importance of IT in business and the need to understand its challenges. The report delves into topics such as security and encryption methods, including symmetric and asymmetric encryption, to protect sensitive data. It also explores the innovation of biometrics, examining its evolution from fingerprints to face recognition. Furthermore, the report evaluates the implications of geo-tracking, discussing its potential for surveillance and stalking. The report provides a critical discussion of cyber threats, including malware, phishing, password attacks, and ransomware, along with preventative measures like firewalls and antivirus software. It emphasizes the importance of keeping systems updated and being cautious of email-based attacks. The report concludes by emphasizing the importance of data encryption, biometric authentication, and staying informed on best practices for data security.

Running head: IS INFORMATION TECHNOLOGY SAFE?
Is information technology safe?
Name of the student:
Name of the university:
Author Note
Is information technology safe?
Name of the student:
Name of the university:
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1IS INFORMATION TECHNOLOGY SAFE?
Executive summary
At present time the information technology has vital role for various business. It is seen that as one is
owning and managing business, that constantly utilize the information technology. This is important
to find the issues for IT systems and the information. Here, the following report it is seen that
whether the information technology is secured or not. The study makes a demonstration of security
and encryption and the method that can keep those secrets. Again, biometrics and finger prints has
been witnessing the technology of face recognition that is also examined in this study. Apart from
that, an investigation is performed on geo tracking. This is able deals with surveillance of the space a
time or stalking.
Executive summary
At present time the information technology has vital role for various business. It is seen that as one is
owning and managing business, that constantly utilize the information technology. This is important
to find the issues for IT systems and the information. Here, the following report it is seen that
whether the information technology is secured or not. The study makes a demonstration of security
and encryption and the method that can keep those secrets. Again, biometrics and finger prints has
been witnessing the technology of face recognition that is also examined in this study. Apart from
that, an investigation is performed on geo tracking. This is able deals with surveillance of the space a
time or stalking.

2IS INFORMATION TECHNOLOGY SAFE?
Table of Contents
Introduction:..........................................................................................................................................3
Understanding of the present topic:.......................................................................................................3
A critical discussion on the topic:..........................................................................................................4
Understanding security and encryption and the ways to keep secrets:..................................................6
Demonstrating the innovation of Biometrics, an evolution from finger prints to face recognition:.....7
Evaluating the case of Geo tracking:.....................................................................................................8
Conclusion:............................................................................................................................................9
References:..........................................................................................................................................11
Table of Contents
Introduction:..........................................................................................................................................3
Understanding of the present topic:.......................................................................................................3
A critical discussion on the topic:..........................................................................................................4
Understanding security and encryption and the ways to keep secrets:..................................................6
Demonstrating the innovation of Biometrics, an evolution from finger prints to face recognition:.....7
Evaluating the case of Geo tracking:.....................................................................................................8
Conclusion:............................................................................................................................................9
References:..........................................................................................................................................11
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3IS INFORMATION TECHNOLOGY SAFE?
Introduction:
The information technology has a critical role for many businesses. As one own and manage
the business making use of information technology, it is vital to determine the challenges for the IT
systems and information. This is helpful to reduce o control eh risks and develop response plans in
time of IT crisis. Legal obligations are there for the business related to staff training, electronic
transactions and privacy affecting strategies of IT risk management. The business owners have the
legal obligations related to the privacy, staff training and electronic transaction affecting the
strategies of IT risk management. The challenges include malicious attacks, viruses, spam, human
error, and software and hardware failure (Al-Dhahri, Al-Sarti and Aziz 2017). Apart from this there
can be natural disasters like flood, cyclones or fires. One can thus manage the risks of IT through
finishing the assessment of business risks. For this, a discussion is made on encryption and security
and the way that keep the secrets. Apart from that, the biometrics and the finger prints for face
recognition are discussed here. Moreover, an evaluation is done on geo tracking that deals with the
surveillance of space a time or the stalking.
Understanding of the present topic:
The information technology, also called as the IT Security is the measure to deploy the
systems designed and measures for securely protecting and securing data. This involves the
multimedia presentations, motion pictures, still images, vice conversations, personal and business
data. This also involves that is never conceived. This is done with different types of technologies for
creating, storing, using and exchanging the data against the unauthorized types of access,
malfunction, misuse, destruction, and improper discloser (Logan 2020). Thus the value can be
preserved with integrity, confidentiality, intended usage availability and capability for performing
Introduction:
The information technology has a critical role for many businesses. As one own and manage
the business making use of information technology, it is vital to determine the challenges for the IT
systems and information. This is helpful to reduce o control eh risks and develop response plans in
time of IT crisis. Legal obligations are there for the business related to staff training, electronic
transactions and privacy affecting strategies of IT risk management. The business owners have the
legal obligations related to the privacy, staff training and electronic transaction affecting the
strategies of IT risk management. The challenges include malicious attacks, viruses, spam, human
error, and software and hardware failure (Al-Dhahri, Al-Sarti and Aziz 2017). Apart from this there
can be natural disasters like flood, cyclones or fires. One can thus manage the risks of IT through
finishing the assessment of business risks. For this, a discussion is made on encryption and security
and the way that keep the secrets. Apart from that, the biometrics and the finger prints for face
recognition are discussed here. Moreover, an evaluation is done on geo tracking that deals with the
surveillance of space a time or the stalking.
Understanding of the present topic:
The information technology, also called as the IT Security is the measure to deploy the
systems designed and measures for securely protecting and securing data. This involves the
multimedia presentations, motion pictures, still images, vice conversations, personal and business
data. This also involves that is never conceived. This is done with different types of technologies for
creating, storing, using and exchanging the data against the unauthorized types of access,
malfunction, misuse, destruction, and improper discloser (Logan 2020). Thus the value can be
preserved with integrity, confidentiality, intended usage availability and capability for performing
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4IS INFORMATION TECHNOLOGY SAFE?
the critical functions permitted. Furthermore, for the safety professionals, the technology can be
utilized for saving time and then reduce the costs. Having the proper tools, the security professionals
are able to efficiently manage and then rack the initiatives of safety and that of the employees and
coworkers. The common threats with IT includes the software and hardware failures, malwares and
viruses, human error and spans, phishing and scams. Then there are the criminal IT threats like the
fraud, hackers, password theft, denial-of-service, and security breaches and staff dishonesty (von
Solms and von Solms 2018). Next, the natural disasters include the floods, cyclones and fire
presenting risks to the IT systems, infrastructure and data. Then there are the damage for the
computer hardware and buildings resulting in corruption or loss of the customer transactions or
records.
A critical discussion on the topic:
The severity of the cyber-security is just restricted to imagination of any person creating that
viruses. One should familiarize with common terms with proactive prevention to assure the security
of personal data. The malware is the common word representing the malicious threats such as worms
or Trojans trying to destroy and steal information. Next, there is the malvertising. It is the ad affected
with the malware. As one click on any ad respective of the impact, the cyber attack is loaded to
coding of ad that is loaded to the system (Elnajjar and Naser 2017). Then, there is the password
attack. This is possibly the obvious attack happening as the hacker attempts to steal the password for
the data. Besides, the cyber thieves are able to use the program for accessing passwords and resort
the traditional fashioned manners. This is peering on the shoulder of the screen of smart phone as
one type he in to the debit card. Next, there is phishing. This targets the email accounts. Here, the
attackers can set up the business the request the personal data and deliver the link for clicking on.
The data on the site one is directed aligns to the data that is gained in the email and at many times
the critical functions permitted. Furthermore, for the safety professionals, the technology can be
utilized for saving time and then reduce the costs. Having the proper tools, the security professionals
are able to efficiently manage and then rack the initiatives of safety and that of the employees and
coworkers. The common threats with IT includes the software and hardware failures, malwares and
viruses, human error and spans, phishing and scams. Then there are the criminal IT threats like the
fraud, hackers, password theft, denial-of-service, and security breaches and staff dishonesty (von
Solms and von Solms 2018). Next, the natural disasters include the floods, cyclones and fire
presenting risks to the IT systems, infrastructure and data. Then there are the damage for the
computer hardware and buildings resulting in corruption or loss of the customer transactions or
records.
A critical discussion on the topic:
The severity of the cyber-security is just restricted to imagination of any person creating that
viruses. One should familiarize with common terms with proactive prevention to assure the security
of personal data. The malware is the common word representing the malicious threats such as worms
or Trojans trying to destroy and steal information. Next, there is the malvertising. It is the ad affected
with the malware. As one click on any ad respective of the impact, the cyber attack is loaded to
coding of ad that is loaded to the system (Elnajjar and Naser 2017). Then, there is the password
attack. This is possibly the obvious attack happening as the hacker attempts to steal the password for
the data. Besides, the cyber thieves are able to use the program for accessing passwords and resort
the traditional fashioned manners. This is peering on the shoulder of the screen of smart phone as
one type he in to the debit card. Next, there is phishing. This targets the email accounts. Here, the
attackers can set up the business the request the personal data and deliver the link for clicking on.
The data on the site one is directed aligns to the data that is gained in the email and at many times

5IS INFORMATION TECHNOLOGY SAFE?
generating false sense of legitimacy and security. Immediately as one input the data the hackers are
able to utilize that as they see fit (Reuter 2019). Again, the Ransomware is the virus that can lock
ever data-documents, contacts and photos and many more till one pay the fee. As one go for the not
to pay the fee, one need to wipe the entire system to use that through losing every data. Next, there is
thwarting of the attacks. For this firewall is of huge help. It is the virtual gate as one can secure or
permit specific traffic from gaining or leaving access to PC. For rising the efficiency the firewall
must remain turned on particularly as one is linked with Internet. Then there are the antivirus
software with the Ranswomware protection. An effective antivirus software is to be invested
involving the plan of Ransomware protection. Maximum of the software of antivirus protection just
monitors the problems and then alone must be alerted and not to take care of the issues. The
purchasing of the antivirus software delivers the proactive and monitoring of protections. Then, the
PC must be kept updated. Maximum of the users never maintain the updates. The upgrades are vital
since the purpose of them is to keep the computer secured. All the time any ne malware is created
and the prior one is upgraded, the programmers are able to hasty work on developing and pushing
out the upgrade to the customers (Peltier 2016). This is to counteract the impacts and keep he data
protected. Then, there is the email. It is seen ninety-one percent of the cyber-attacks comes out from
emails. One must be wary of the mains ne receive the request passwords, requesting on social
security number, offering anything that s free and alert one with urgent warning and threat of any
accounts expiration. Then there is the request credit of the information on credit card. It is seen that
everytime one uses Internet, footprints are left. This is where one bank, shop or wish to buy. Here,
the Malware tricks the footprints and attempts to track through generating the pop-up advertisements
and emails catered to the internet browsing, buying habits and searching (Mahdi, Alhabbash and
Naser 2016).
generating false sense of legitimacy and security. Immediately as one input the data the hackers are
able to utilize that as they see fit (Reuter 2019). Again, the Ransomware is the virus that can lock
ever data-documents, contacts and photos and many more till one pay the fee. As one go for the not
to pay the fee, one need to wipe the entire system to use that through losing every data. Next, there is
thwarting of the attacks. For this firewall is of huge help. It is the virtual gate as one can secure or
permit specific traffic from gaining or leaving access to PC. For rising the efficiency the firewall
must remain turned on particularly as one is linked with Internet. Then there are the antivirus
software with the Ranswomware protection. An effective antivirus software is to be invested
involving the plan of Ransomware protection. Maximum of the software of antivirus protection just
monitors the problems and then alone must be alerted and not to take care of the issues. The
purchasing of the antivirus software delivers the proactive and monitoring of protections. Then, the
PC must be kept updated. Maximum of the users never maintain the updates. The upgrades are vital
since the purpose of them is to keep the computer secured. All the time any ne malware is created
and the prior one is upgraded, the programmers are able to hasty work on developing and pushing
out the upgrade to the customers (Peltier 2016). This is to counteract the impacts and keep he data
protected. Then, there is the email. It is seen ninety-one percent of the cyber-attacks comes out from
emails. One must be wary of the mains ne receive the request passwords, requesting on social
security number, offering anything that s free and alert one with urgent warning and threat of any
accounts expiration. Then there is the request credit of the information on credit card. It is seen that
everytime one uses Internet, footprints are left. This is where one bank, shop or wish to buy. Here,
the Malware tricks the footprints and attempts to track through generating the pop-up advertisements
and emails catered to the internet browsing, buying habits and searching (Mahdi, Alhabbash and
Naser 2016).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6IS INFORMATION TECHNOLOGY SAFE?
Understanding security and encryption and the ways to keep secrets:
The data encryption is the security method in the place where data is decoded and just be
decrypted or accessed by users having suitable keys of encryption. The data encrypted is also
referred to as ciphertext has been appearing scrambled and unreadable or the entity or person to
access despite and permission. The data encryption can be utilized for determine the negligent or
malicious sides from accessing any type of sensitive information (Torten, Reaiche and Boyle 2018).
Here, the vital defense of line in cyber security architecture have the encryption to use the
intercepted information as complicated as possible. This is also applicable to every types of needs of
data protection like classified government intel and transactions of personal credit card. The software
of data encryption is also referred to as the encryption algorithm or the cipher can be utilized for
developing any scheme of encryption. This could be broken theoretically having huge quantity of the
power of computing (Langer 2017). Furthermore, the encryption comprise of two types. They are
asymmetric and symmetric. The encryption is commonly applicable to these type of formats. The
secret key or symmetric key utilizes a single key for decoding and encoding the data. It can be used
best for the sharing and various smear sets of data. The public key cryptography or the asymmetry
can utilize the keys that are linked. One is public and private. Moreover, the encryption is key is
public in nature and could be utilized to encrypt by anyone (Quinn 2017). Besides, the opposite is
been kept private and utilized for decrypting. The data encryption is provided in the current world of
the cyber security. There is no responsible security program who are without that. For assuring that
the information is secured, the organization must be educated on the best practices for sharing and
using data.
Understanding security and encryption and the ways to keep secrets:
The data encryption is the security method in the place where data is decoded and just be
decrypted or accessed by users having suitable keys of encryption. The data encrypted is also
referred to as ciphertext has been appearing scrambled and unreadable or the entity or person to
access despite and permission. The data encryption can be utilized for determine the negligent or
malicious sides from accessing any type of sensitive information (Torten, Reaiche and Boyle 2018).
Here, the vital defense of line in cyber security architecture have the encryption to use the
intercepted information as complicated as possible. This is also applicable to every types of needs of
data protection like classified government intel and transactions of personal credit card. The software
of data encryption is also referred to as the encryption algorithm or the cipher can be utilized for
developing any scheme of encryption. This could be broken theoretically having huge quantity of the
power of computing (Langer 2017). Furthermore, the encryption comprise of two types. They are
asymmetric and symmetric. The encryption is commonly applicable to these type of formats. The
secret key or symmetric key utilizes a single key for decoding and encoding the data. It can be used
best for the sharing and various smear sets of data. The public key cryptography or the asymmetry
can utilize the keys that are linked. One is public and private. Moreover, the encryption is key is
public in nature and could be utilized to encrypt by anyone (Quinn 2017). Besides, the opposite is
been kept private and utilized for decrypting. The data encryption is provided in the current world of
the cyber security. There is no responsible security program who are without that. For assuring that
the information is secured, the organization must be educated on the best practices for sharing and
using data.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7IS INFORMATION TECHNOLOGY SAFE?
Demonstrating the innovation of Biometrics, an evolution from finger prints to
face recognition:
The biometric permits people to get identified and the authentication on the bass of set of
verifiable or recognizable information that is specific and unique to them. The authentication of
biometric is the method to compare data for the characteristic of people for the biometric template of
the people for determining any resemblances. This reference model is stored first in the database and
the secured portable element just as smart card. Next, the data stored is compared to the biometric
data of the people to become authenticated. At this place, the identity of the person is needed to be
get verified. The aim is that one must capture the item of the biometric data from that person. This
could be the photo of face and voice record and image of the fingerprint (Bryen 2017). Then, the
data is compared to biometric data of various other individuals that are kept in the database. At that
mode the question is just simple that states ‘Who are you?”. Seeing the identity theft and document
fraud, the latest threats lie cybercrime and terrorism and modifications in the various international
regulations, the latest technological solutions are implemented gradually. Out of these technologies,
the biometrics are established fast as the pertinent sectors of determining and authenticating people
in fast and reliable manner, with the usage of distinct characteristics of biology. The rise in public
acceptance, huge achievement in accuracy, rich offers, falling costs of sensors, software and IP
cameras are simple to install the biometric type of solutions (White, Hewitt and Kruck 2019). At
present various applications use that technology. The biometrics can be regarded as the science to
assess the behavioral and physical characteristics particular to every people who can authenticate
their individual identity. As one define the biometrics and biometry in straightforward way, one can
stats the human body’s measurement. Two categories of biometrics are there. Firstly, there is the
physiological measurement. This can biological or morphological. It comprise of fingerprints, shape
of hand or finger, vein pattern, eye of iris and retina, shape of face and morphological analysis.
Demonstrating the innovation of Biometrics, an evolution from finger prints to
face recognition:
The biometric permits people to get identified and the authentication on the bass of set of
verifiable or recognizable information that is specific and unique to them. The authentication of
biometric is the method to compare data for the characteristic of people for the biometric template of
the people for determining any resemblances. This reference model is stored first in the database and
the secured portable element just as smart card. Next, the data stored is compared to the biometric
data of the people to become authenticated. At this place, the identity of the person is needed to be
get verified. The aim is that one must capture the item of the biometric data from that person. This
could be the photo of face and voice record and image of the fingerprint (Bryen 2017). Then, the
data is compared to biometric data of various other individuals that are kept in the database. At that
mode the question is just simple that states ‘Who are you?”. Seeing the identity theft and document
fraud, the latest threats lie cybercrime and terrorism and modifications in the various international
regulations, the latest technological solutions are implemented gradually. Out of these technologies,
the biometrics are established fast as the pertinent sectors of determining and authenticating people
in fast and reliable manner, with the usage of distinct characteristics of biology. The rise in public
acceptance, huge achievement in accuracy, rich offers, falling costs of sensors, software and IP
cameras are simple to install the biometric type of solutions (White, Hewitt and Kruck 2019). At
present various applications use that technology. The biometrics can be regarded as the science to
assess the behavioral and physical characteristics particular to every people who can authenticate
their individual identity. As one define the biometrics and biometry in straightforward way, one can
stats the human body’s measurement. Two categories of biometrics are there. Firstly, there is the
physiological measurement. This can biological or morphological. It comprise of fingerprints, shape
of hand or finger, vein pattern, eye of iris and retina, shape of face and morphological analysis.

8IS INFORMATION TECHNOLOGY SAFE?
Regarding biological assessment, blood, DNA, urine or saliva might be utilized by various medical
teams and forensics of police (Cavelty and Mauer 2016). Next, there is biological measurement.
Here, the most common is the voice recognition, keystroke dynamics, signature dynamics, way to
utilize objects, sound of steps, gestures and gait and many more. Various techniques that are utilized
are debate of current development and research and can be constantly developed. Nevertheless,
various kinds of measurements never possess similar reliability level. Again, the physiological
measurements offer the advantages to stay more stable across the individual’s life. Here, the for
instance, they are never subjected to the impacts of the stress as compared to the identification
trough different behavioral type of measurement (Radwan, Azer and Abdelbaki 2017).
Evaluating the case of Geo tracking:
This discussion helps to understand the surveillance of space and time and stalking. These terms
are turning to be rousingly important as an evaluating software. Here, the entire process for every terms
is distinct and results from utilizing them are different functionally. The geo tracking is been across for
few years and has been featuring in new as individuals understand that the innovation of Apple is
recording and monitoring all the moves of the owners iPhone. As one utilize iPhone one can search the
data displaying the time of arrival and time where one has left various locations. It occurs for everyday
and has been recording as one move across from any place to the other. It utilizes the assimilation of
technologies for tracking the location that involves the GPA signal, making access to the hotspot of
WiFi along with triangulation of signal on phone as that links to various owners of the cell. The owners
of Andorid phone can also monitor and track through the similar phase of details regarding the
movements that is never accessed on phone (Layton 2016). Here, the advantages of the business are
that as one can require to find anyone. Here, for instance for any emergency calling case, one should
call out for the engineer for visiting the customers, nearest support engineer could be determined and
Regarding biological assessment, blood, DNA, urine or saliva might be utilized by various medical
teams and forensics of police (Cavelty and Mauer 2016). Next, there is biological measurement.
Here, the most common is the voice recognition, keystroke dynamics, signature dynamics, way to
utilize objects, sound of steps, gestures and gait and many more. Various techniques that are utilized
are debate of current development and research and can be constantly developed. Nevertheless,
various kinds of measurements never possess similar reliability level. Again, the physiological
measurements offer the advantages to stay more stable across the individual’s life. Here, the for
instance, they are never subjected to the impacts of the stress as compared to the identification
trough different behavioral type of measurement (Radwan, Azer and Abdelbaki 2017).
Evaluating the case of Geo tracking:
This discussion helps to understand the surveillance of space and time and stalking. These terms
are turning to be rousingly important as an evaluating software. Here, the entire process for every terms
is distinct and results from utilizing them are different functionally. The geo tracking is been across for
few years and has been featuring in new as individuals understand that the innovation of Apple is
recording and monitoring all the moves of the owners iPhone. As one utilize iPhone one can search the
data displaying the time of arrival and time where one has left various locations. It occurs for everyday
and has been recording as one move across from any place to the other. It utilizes the assimilation of
technologies for tracking the location that involves the GPA signal, making access to the hotspot of
WiFi along with triangulation of signal on phone as that links to various owners of the cell. The owners
of Andorid phone can also monitor and track through the similar phase of details regarding the
movements that is never accessed on phone (Layton 2016). Here, the advantages of the business are
that as one can require to find anyone. Here, for instance for any emergency calling case, one should
call out for the engineer for visiting the customers, nearest support engineer could be determined and
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9IS INFORMATION TECHNOLOGY SAFE?
contacted and then routed for visiting customers. It provides the benefits to customers as one react to
them quicker and can fix the issues and make them to be operational again. At this context the Geofence
is an important concept. It is a particular location. This is specified as specific address on the basis of
longitude and latitude of the location of map. This can be done through setting distance from address or
at any point over map. It is set unusually, like one can state 25 to 50 meters from address. It generates
the circular radius and zone across the location (McCormac et al. 2017). As anyone enters or makes
exit of the zone of geofence that can trigger the event like recording of time. It is different as that event
is able to trigger on exit or entry apart from the recording of location such as geotracking. This similar
assimilation of technologies are utilized by mobile phones for determining the location since it is
utilized for the geotracking and never recorded every time. Here, the advantages of business involve the
calculation done automatically for the time spent. The building site can be taken as example. As one is
charging the customers to travel in item and also time at the premise as the time of travelling is
calculated automatically between a couples of registered zones.
Conclusion:
It is understood from the above study that internet security is never all related to securing data
from any kind of unauthorized access. It is primarily the practice to prevent the unauthorized access
usage disclosing, modification, disruption, inspection, destruction of recording of data. Here, the data
could be electric or physical. The data could be everything such the details and e profile over social
media like data in the mobile phones and biometrics. With the plan of business continuity one can
help the business to recover the IT incident. As the business depends on the IT systems like networks
and computers the primary business tasks one require to stay aware of range and nature of the risks
of the systems. In this study, it is analyzed whether information technology is safe or not. In this way
the information security has been spanning various researches such as online social media, cyber
contacted and then routed for visiting customers. It provides the benefits to customers as one react to
them quicker and can fix the issues and make them to be operational again. At this context the Geofence
is an important concept. It is a particular location. This is specified as specific address on the basis of
longitude and latitude of the location of map. This can be done through setting distance from address or
at any point over map. It is set unusually, like one can state 25 to 50 meters from address. It generates
the circular radius and zone across the location (McCormac et al. 2017). As anyone enters or makes
exit of the zone of geofence that can trigger the event like recording of time. It is different as that event
is able to trigger on exit or entry apart from the recording of location such as geotracking. This similar
assimilation of technologies are utilized by mobile phones for determining the location since it is
utilized for the geotracking and never recorded every time. Here, the advantages of business involve the
calculation done automatically for the time spent. The building site can be taken as example. As one is
charging the customers to travel in item and also time at the premise as the time of travelling is
calculated automatically between a couples of registered zones.
Conclusion:
It is understood from the above study that internet security is never all related to securing data
from any kind of unauthorized access. It is primarily the practice to prevent the unauthorized access
usage disclosing, modification, disruption, inspection, destruction of recording of data. Here, the data
could be electric or physical. The data could be everything such the details and e profile over social
media like data in the mobile phones and biometrics. With the plan of business continuity one can
help the business to recover the IT incident. As the business depends on the IT systems like networks
and computers the primary business tasks one require to stay aware of range and nature of the risks
of the systems. In this study, it is analyzed whether information technology is safe or not. In this way
the information security has been spanning various researches such as online social media, cyber
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10IS INFORMATION TECHNOLOGY SAFE?
forensics, mobile computing and cryptography. In the central part of the information security is the
information assurance, indicates the acting to maintain CIA of data. This assures the fact the data is
never compromised such that as any critical problem arises. The problem is never limited to server or
computer malfunctions, natural disasters and many more. In this way the area of e information security
has been evolving and growing at resent time. This has been offering various sectors that are related to
specialization and involves the securing of networks and the infrastructure that is allied, safeguarding
databases and applications. Here, there is the auditing of information system, planning of business
continuity and testing of security and many more.
forensics, mobile computing and cryptography. In the central part of the information security is the
information assurance, indicates the acting to maintain CIA of data. This assures the fact the data is
never compromised such that as any critical problem arises. The problem is never limited to server or
computer malfunctions, natural disasters and many more. In this way the area of e information security
has been evolving and growing at resent time. This has been offering various sectors that are related to
specialization and involves the securing of networks and the infrastructure that is allied, safeguarding
databases and applications. Here, there is the auditing of information system, planning of business
continuity and testing of security and many more.

11IS INFORMATION TECHNOLOGY SAFE?
References:
Al-Dhahri, S., Al-Sarti, M. and Aziz, A.A., 2017. Information Security Management System.
International Journal of Computer Applications, 158(7), pp.29-33.
Bryen, S.D., 2017. Technology security and national Power: winners and Losers. Routledge.
Cavelty, M.D. and Mauer, V., 2016. Power and security in the information age: Investigating the
role of the state in cyberspace. Routledge.
Elnajjar, A.E.A. and Naser, S.S.A., 2017. DES-Tutor: An Intelligent Tutoring System for Teaching
DES Information Security Algorithm.
Langer, S.G., 2017. Cyber-security issues in healthcare information technology. Journal of digital
imaging, 30(1), pp.117-125.
Layton, T.P., 2016. Information Security: Design, implementation, measurement, and compliance.
Auerbach Publications.
Logan, P.Y., 2020. Crafting an undergraduate information security emphasis within information
technology. Journal of Information Systems Education, 13(3), p.3.
Mahdi, A.O., Alhabbash, M.I. and Naser, S.S.A., 2016. An intelligent tutoring system for teaching
advanced topics in information security.
McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M. and Pattinson, M., 2017.
Individual differences and information security awareness. Computers in Human Behavior, 69,
pp.151-156.
References:
Al-Dhahri, S., Al-Sarti, M. and Aziz, A.A., 2017. Information Security Management System.
International Journal of Computer Applications, 158(7), pp.29-33.
Bryen, S.D., 2017. Technology security and national Power: winners and Losers. Routledge.
Cavelty, M.D. and Mauer, V., 2016. Power and security in the information age: Investigating the
role of the state in cyberspace. Routledge.
Elnajjar, A.E.A. and Naser, S.S.A., 2017. DES-Tutor: An Intelligent Tutoring System for Teaching
DES Information Security Algorithm.
Langer, S.G., 2017. Cyber-security issues in healthcare information technology. Journal of digital
imaging, 30(1), pp.117-125.
Layton, T.P., 2016. Information Security: Design, implementation, measurement, and compliance.
Auerbach Publications.
Logan, P.Y., 2020. Crafting an undergraduate information security emphasis within information
technology. Journal of Information Systems Education, 13(3), p.3.
Mahdi, A.O., Alhabbash, M.I. and Naser, S.S.A., 2016. An intelligent tutoring system for teaching
advanced topics in information security.
McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M. and Pattinson, M., 2017.
Individual differences and information security awareness. Computers in Human Behavior, 69,
pp.151-156.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 12
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.
