Information Systems Security Report: Threats, Vulnerabilities, and IBM

Verified

Added on  2023/05/26

|5
|747
|57
Report
AI Summary
This report delves into the fundamental aspects of information systems security, highlighting the increasing rate of security threats and the importance of cybersecurity measures. It explores various IT security fundamentals such as threat analysis, auditing, vulnerability assessment, and risk assessment. The report identifies common vulnerabilities within IT infrastructures, including legacy software, DDOS attacks, malware, phishing, ransomware, and configuration conflicts. It recommends mitigation tools like firewalls, antivirus software, encryption, and regular software updates. Furthermore, the report analyzes IBM's security architecture, focusing on its authentication servers, authorization services, cryptographic technology, and firewall processes, to illustrate a robust approach to safeguarding information. Desklib provides this and other solved assignments to aid students in their studies.
Document Page
Information Systems Security
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INFORMATION SYSTEMS SECURITY
1
IT security fundamental
In the field of computer science, the security of data is one of the biggest concern
and many companies are facing such an issue. To avoid such issue information
technology develops a new approach that is cyber security which protects the
hardware, software, computer networks and personal data. In the last two years the
rate of security threats has increased by 40% due to lack of security and this rate is
growing very fast. There are many IT security fundamentals involves in the area of
information security which are the following:
Threat Analysis and classification
Auditing and penetration testing
Vulnerability assessment
Attack vectors terminology
Risk assessment
Common vulnerabilities with an IT infrastructure
There are many threats and vulnerabilities occur with information technology
infrastructures which are described below:
Legacy software
DDOS attack
Malware
Phishing
Ransomware
Wanna cry attack
Configuration conflict issue
The operating system works on a legacy software system which lack sufficient
consumers and system authentication and data verification. Due to use of unauthentic
servers consumers can lose their personal details.
DDOS is defined as the distributed denial of service attack that occurs when any
person uses fraud links and unwanted signals. In which hackers send traffic signals on
Document Page
INFORMATION SYSTEMS SECURITY
2
the network of consumers and hack their personal data or information (Yan Qian,
Sharif, & Tipper, 2012).
Malware is a kind of software that generates unauthentic networks and spam links
which are transferred to the computer networks of consumers. Many hackers use this
step to block the personal devices of consumers and hack their private details (Von
Solms, & Van Niekerk, 2013).
Phishing is a kind of security threat that occurs when any person clicks on the fraud
links and use third party applications which are developed by the hackers. In which
hackers send spam emails to consumers and enter into their computer devices to
encrypt their personal data files.
Recommendation and mitigation tools
It is recommended that the issue of security can be reduced by adopting advanced
networks and techniques like encryption, firewall and many more (Ericsson, 2010).
Recently information technology developed many approaches and methods to address
the cyber-threats and vulnerabilities which are the following:
Firewall and antivirus
Adopt encryption and cryptography technology
Use only authentic networks
Update software on a regular basis
Analysis of a security architecture of IBM
IBM is one of the largest business industries in the world which deals with
information technology products. To improve the security of their data or information
IT team developed a security infrastructure which is flexible and compatible with the
security model. There are following techniques involves in the architecture of IBM:
IBM Cognos authentication servers
IBM authorization services and networks
Cryptographic technology
IBM Congo’s Firewall
Document Page
INFORMATION SYSTEMS SECURITY
3
Figure: IT architecture of IBM
(Source: IBM, 2014)
IBM firewall process validates and filters the incoming and outgoing unwanted
or traffic signals at the dispatcher layer.
Authentication is a kind of method to identify consumers before allowing them
to log on.
An authorization service is mainly used to detect the traffic signals and
unauthentic servers from computer networks by which the issue of cyber-crime can be
resolved.
Cryptography provides a platform to increase the privacy of personal
information and also ensure that IBM congas BI communication and personal data are
secure or private.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INFORMATION SYSTEMS SECURITY
4
References
IBM (2014). Security Architecture, Available from
https://www.ibm.com/support/knowledgecenter/en/SSEP7J_10.1.1/com.ibm.s
wg.ba.cognos.crn_arch.10.1.1.doc/c_arch_security.html
Ericsson, G. N. (2010). Cybersecurity and power system communication—essential
parts of a smart grid infrastructure. IEEE Transactions on Power Delivery, 25(3),
1501-1507.
Von Solms, R., & Van Niekerk, J. (2013). From information security to
cybersecurity. computers & security, 38, 97-102.
Yan, Y., Qian, Y., Sharif, H., & Tipper, D. (2012). A survey on cybersecurity for smart grid
communications. IEEE Communications Surveys and Tutorials, 14(4), 998-1010.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]