IT Security: An Analysis of Risks, Procedures, and Security Measures

Verified

Added on  2022/12/30

|9
|538
|80
Report
AI Summary
This report provides an overview of IT security, focusing on the critical aspects of data protection. It begins by defining IT security and its importance in safeguarding sensitive information. The report then identifies various types of security risks, including computer viruses, adware, spyware, phishing attacks, and zero-day vulnerabilities. It also delves into the procedures that organizations can implement to mitigate these risks, emphasizing the importance of security controls and consistent business processes. The report concludes by highlighting the significance of data security and its role in protecting organizations from cyber threats. References to academic sources support the analysis, offering a comprehensive understanding of the subject.
Document Page
IT Security
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Content
Introduction
Types of security risks
Organisational security procedures
Conclusion
References
Document Page
Introduction
IT security refers to security of data. They focus on three elements;
confidentiality, integrity and availability of data. In today's world, all
important data is saved in laptop, PCs or in any software. Earlier, data
used to be secured in a filling cabinet but now everyone makes sure that
their data is secured enough and is a much broader term than cyber
security. It involves security risks to organization, procedures of
organizational security.
Document Page
Types of security risks to organization
Computer viruses:- It is a software program that can move from one
network to another or even from one computer to another and user don't
have any idea that such malicious attacks are being performed. Through
virus, organization data can be destroyed. There are many computer
viruses like Trojan Horse, worms.
Adware:- It refers to software program which involve all commercial as
well as marketing advertisements with the help of videos, banner ads. Its
basic motive is to have revenue for tehir software developer by creating
advertisements.
Spyware:- It is a type of security risk that is installed in computer and
gain all information about the data, personal details and user don't have
any knowledge about that.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Continue..
Phishing:- It refers to the attack to generate information regarding
credit card details, passwords. It sends various emails to users in exact
form that a bank send an email regarding personal information.
Zero day attack:- It is a type of security threat which is an unknown
vulnerability and when any organization download its application then
tehir don't have any idea regarding those vulnerability attack.
Document Page
Organizational security procedures
Security procedures refers to a process of instructions regarding
implementation or enforcement of security controls as determined by
security policies. It should include hardware as well as software elements
which supports process of businesses or any other safety which is related
to their own business. Security procedures are designed and
implemented so that security of business process remain consistent.
Every organization has to follow certain process to ensure security
control in organization. The concept of security procedures also focuses
on guiding behaviour and to properly follow all procedures there are
certain baselines as well as standards which are determined in an
organization.
Document Page
Conclusion
According to above analysis it is concluded that, daat security is the most
important thing for any organisation. There are many risks that affects
organisation and due to which personal details and all sensitive
information regarding organisation is hacked by third parties. The
different security risks that affects the organisation are phishing,
computer viruses, zero day attack and so on.
.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
Anderson, R., 2020. Security engineering: a guide to building dependable
distributed systems. John Wiley & Sons.
Bramas, Q., 2018. The Stability and the Security of the Tangle.
Document Page
Thank You
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]