University IT Security Report: Traditional vs. Modern Approaches

Verified

Added on  2023/06/08

|6
|1284
|242
Report
AI Summary
This report delves into the realm of Information Technology Security, contrasting traditional security measures with modern information security practices. It begins by defining traditional security, highlighting the role of Closed Circuit Television (CCTV) and alarming systems in preventing misconduct and unauthorized access. The report then transitions to information security, emphasizing data protection through firewalls, encryption, and secure portals. It explores the vulnerabilities inherent in both traditional and modern technologies, such as privacy concerns with CCTV, potential flaws in alarming systems, firewall weaknesses, and identity crises with portal systems. The report concludes by examining the evolution of security measures, including advancements in CCTV, improved alarming systems, antivirus software, and two-factor authentication for portals, showcasing the continuous adaptation of security protocols in response to emerging threats and technological advancements. This analysis provides a comprehensive overview of IT security and its ongoing evolution.
Document Page
Running Head: INFORMATION TECHNOLOGY SECURITY
Information Technology Security
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
INFORMATION TECHNOLOGY SECURITY
PART I
Traditional Security impacts
Traditional security is defined as physical set of security features that ensures the fact
equipment’s that are needed to conduct management tasks are safe and no harm can be caused to
them. Most effective traditional security technology that is being used in today’s society is
closed circuit television. Importance of closed circuit television is that the processing of each add
every details that is done under the surveillance of the camera is recorded. This helps in
preventing any kind of misconduct that can be done by imposters. This helps in disclosing truth
behind any kind of misconduct that is performed during the time of cross training. In case during
cross training any employee performs any kind of misconduct, their activities will be recorded in
the Closed circuit television. This ensures the fact that no employees can do any unjustified work
inside the office premises. Misconducts namely stealing of equipment’s on which they are
working is one of the most common factors. To reduce this kind of activities Closed circuit
television is used. Introduction to technological change incurs the fact that new appliances will
be brought in and old appliances will be off loaded. During offloading of old appliances,
unauthorized access has been the major reason for loss of capital during technological exchange.
Introduction of Closed Circuit Television has drastically reduced this kind of issues after its
introduction. Alarming systems can also be considered to be one of the most important factors.
This technology ensures the fact that in case of unauthorized access to certain appliances alarm
will ring which will help the security system of the organization to get alert and take active steps
in the process.
Document Page
3
INFORMATION TECHNOLOGY SECURITY
Information security impacts
Information security is mostly concerned with the data that is stored in the database of the
system. This ensures the fact that data processing is performed in a safe manner. Installing
firewall is one of the most common way to secure the data that is stored in the database of the
organization. During the time of cross training the major issue of the organization is that the data
that is stored in the processing of data is stolen by imposters. This ensures the fact that the data
that is stored in database is encrypted before the transaction, this helps the data to stay protected
from the imposters as the imposters needs to encrypt the data before gaining access ti the same.
This increases the robustness of database is which the data is being stored. Decryption of the data
stored in database is only possible by demodulating the data as per the modulating stature of that
particular data. During the time of cross training employees get access to data that are stored and
created by other department of the same organization. This ensures the fact that in case any
imposter’s wants to get access to data of other department can easily get access to the same. To
mitigate this kind of problem, the step that is taken by organization is that portal of every
individual is created and access of every individual is protected. This acts as the major process
that organizations to get hold of the imposters who wants to access data in an unauthorized
manner. This is the major that proves the impact of Information technology in the field of
management and security systems.
PART II
Vulnerabilities of new technologies
Vulnerability of technologies that are incorporated from the traditional approach like Closed
circuit camera is that it does not support privacy to the employees who are working in this
project. This is one of the major problem that arises in the course of usage of Closed circuit
Document Page
4
INFORMATION TECHNOLOGY SECURITY
Television. Another major issue in the field of traditional security approach is alarming system.
In case of alarms, they are pre-programmed in such a way that it might not acknowledge the
genuine client due to presence in bug in the code of the alarming system. This leads to the fact
that although n authorized person is trying to gain access an object, Alarm rings leading to the
fact that employees who are in charge of the security of the object gets alert and a nuisance is
created. In case of Information Technology security tools the major issue is that the processing of
authentication is not done properly. In case of firewall that is installed in most of the
organization for providing safety to the data that is stored in the database acts in an inefficient
manner. This leads to the fact that the data that is stored in the data base is accessed by the
imposters as imposters has already found out the loopholes of the firewall. Introducing malicious
set of codes is one of the major way that leads to the processing of data by illegal process. In
case malicious code is injected in the firewall, it keeps on searching for the source address and
being unable to find the source address it runs in an infinite loop. In between this time imposters
gains access to the data and does what they want to do. In case of creation of portals, major
vulnerability lie in term of identity crisis of an individual. In this case an imposter can get access
to portal of another individual. Hence the imposter can act on behalf of the genuine employee
leading to creation of conflict in between internal and external stakeholders of the organization.
Logical Conclusion
Initially when closed circuit television was manufactured, it did not had red light of its own.
With time passing by, Closed Circuit television is equipped with its own lighting system that
enables the system to capture images in very low light conditions. The feature of capturing low
light high resolution video by Closed Circuit television has increased the usability of the Closed
Circuit television. Evolution of alarming systems is notable as the initial set of alarming systems
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5
INFORMATION TECHNOLOGY SECURITY
were not very much accustomed with the authentication of the owner and it used to alert the
security. After the evolution, authentication of the owner is pre-programmed and alarm rings
only when unauthenticated personnel gets access to the product. In case of IT security
techniques, evolution of antivirus module has taken place and usage of specialized software is
made instead of generalized firewall. Portal system are incorporated with two factor security
system. This ensures the fact that security is maintained in a higher note.
Document Page
6
INFORMATION TECHNOLOGY SECURITY
References
Fay, J. (2006). Contemporary security management. (2nd ed.). Boston: Butterworth-
Heinemann.
Purpura, P. (2008). Security and loss prevention: An introduction. (5th ed.). Boston:
Butterworth-Heinemann.
Mrimoso, M. (2002). Converging worlds: IT and traditional security. Retrieved from
http://whatis.techtarget.com/originalContent/0,289142,sid14_gci868819,00.html.
Carr, K. (Ed.). (2005). Spending to fund convergence rises. Retrieved from
http://www.csoonline.com/article/220296/spending-to-fund-convergence-rises
Securityinfowatch.com. (2008, March 14). Episode 24: Talking security convergence. Retrieved
from
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]