StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Technology of Information Security - Essay Example

Cite this document
Summary
In this scenario, their data and information are stored in different locations. For instance, in many cases data and information are kept on a…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Technology of Information Security
Read Text Preview

Extract of sample "Technology of Information Security"

TECHNOLOGY OF INFORMATION SECURITY Technology of Information Security Affiliation At the present, the majority of business organizations use a distributed computing environment to store their data and information. In this scenario, their data and information are stored in different locations. For instance, in many cases data and information are kept on a centralized server. On the other hand, some organizations prefer to store their data in the decentralized data storage system. In this scenario, each user is individually responsible for managing and updating his own data on his own computer.

However, the most commonly used scenarios at the present are a mixture of these two solutions, where some data are stored on a centralized server and accessed by client computers, as well as some data is stored only on local computers which is never shared with other client computers (Microsoft, 2003; Shelly, Cashman, & Vermaat, 2005). In addition, all of the above discussed situations come with a variety of security problems to consider. In fact, for the majority of business organizations, at the very least some of this data must be kept secure.

Moreover, in order to help present effective data security in the above discussed situations, there exist a wide variety of IT security technologies that can be used by the business organizations to keep their sensitive data and information secure during storage and network communication. Additionally, there is not a single IT security technology that has the capability to protect all data against all kinds of attack. However, there are many security technologies that can be combined to implement a wide-ranging security infrastructure that protects against a wide variety of security attacks (Microsoft, 2003; Shelly, Cashman, & Vermaat, 2005).

I have presented below three information security technologies:1. FirewallsIt is an admitted fact that the majority of business organizations are exposing their personal networks to Internet traffic; as a result, the deployment of firewalls has become a basic need. Basically, “a firewall stops illegal communication inside and outside of the network, facilitating the company to implement a security strategy on traffic running between its network and the Internet” (Turban, Leidner, McLean, & Wetherbe, 2005; Laudon & Laudon, 1999).

Additionally, firewalls can be either software or hardware. However, an effective firewall arrangement will be based on both (Beal, 2004). In this scenario, a firewall divides a network into different domains. A wide-ranging implementation of the firewall has the Internet as un-trusted domain; a semi trusted and a semi secure network, acknowledge the demilitarized zone (DMZ), as an additional domain; and an organization’s computers as a third domain (Silberschatz, Galvin, & Gagne, 2004, p. 673).2. EncryptionSecond information security technology that I have chosen is the encryption technology.

Encryption is the process of translating information and data into a hidden or secret code. In addition, it is a very effective method for ensuring data security. In this scenario, for the interpretation of encrypted data and files, the receiver should have access to a secret key or password that allows them to decrypt it. In addition, this unencrypted information and data is acknowledged as plain text on the other hand hidden or encrypted data is acknowledged as cipher text. Additionally, the encryption technology allows us to encrypt massive set of information and data.

For instance, in order to carry out business transactions over the Internet we need some sort of sensitive and high value information such as confidential communication, credit-card information, social security information, personal details, susceptible business details and bank-account information. In this scenario, a straightforward security technique is to merely keep secret information on removable storage media like peripheral hard drives or moveable pen drives (Webopedia, 2010; Tyson, 2010). 3. Intrusion Detection System (IDS)An intrusion detection system (IDS) is aimed at identifying applied or attempted intrusions into the network and carrying out appropriate operations for the intrusions.

Basically, the intrusion detection encompasses a wide variety of techniques that differ on several axes. Some of these axes include: discussed by (Silberschatz, Galvin, & Gagne, 2004)The time at which detection occurs: in real time (while it is taking place) or following the information only.The types of input inspected to identify intrusive action. In this scenario, these inputs can comprise a process system calls, user shell commands and network packet headers or contents. In addition, different types of intrusions can be detected only by correlating information from various such sources.

A wide variety of action capabilities. In this scenario, some of the basic steps comprise changing an administrator of the possible intrusion or in some way halting the potentially intrusive action, for example, discarding an action involved in the actual intrusive activity. In a complicated type of action, a system might clearly redirect an intruder’s action to a trap. In addition, a false resource exposed to the attacker with the aim of observing and gaining information about the attack; to the attacker, the resource appears real.

ReferencesBeal, V. A. (2004, November 5). The Differences and Features of Hardware & Software Firewalls. Retrieved June 21, 2012, from Webopedia.com: http://www.webopedia.com/didyouknow/hardware_software/2004/firewall_types.aspLaudon, K. C., & Laudon, J. P. (1999). Management Information Systems, Sixth Edition (6th ed.). New Jersey: Prentice Hall.Microsoft. (2003, March 28). Data Security Technologies. Retrieved June 20, 2012, from http://technet.microsoft.com/en-us/library/cc785896(v=ws.10).aspxShelly, Cashman, & Vermaat. (2005). Discovering Computers 2005.

Boston: Thomson Course Technology.Silberschatz, A., Galvin, P. B., & Gagne, G. (2004). Operating System Concepts (7th Edition). New York: Wiley.Turban, E., Leidner, D., McLean, E., & Wetherbe, J. (2005). Information Technology for Management: Transforming Organizations in the Digital Economy . New York: Wiley.Tyson, J. (2010). How Encryption Works. Retrieved June 20, 2012, from HowStuffWorks: http://computer.howstuffworks.com/encryption.htmWebopedia. (2010). Encryption. Retrieved June 20, 2012, from http://www.webopedia.com/TERM/E/encryption.html

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Technology of Information Security Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Technology of Information Security Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1598933-technology-of-information-security
(Technology of Information Security Essay Example | Topics and Well Written Essays - 500 Words)
Technology of Information Security Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1598933-technology-of-information-security.
“Technology of Information Security Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1598933-technology-of-information-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Technology of Information Security

Information Technology Security

hellip; The protection of such information as bank account statements, credit card numbers, personal information, government documents, and trade secrets remain a critical part of information security.... Name: Tutor: Course: Date: University: Information Technology and Security Introduction CIA denotes confidentiality of information, integrity of information, and availability of information.... Confidentiality of information relates to safeguarding of information from disclosure to unauthorized parties (Feruza and Kim 2007, pp....
3 Pages (750 words) Essay

Information Technology Security

With the increased usage of computers and the Internet, there is a lot of movement data and personal information.... Another very common fraud is unauthorised access to information where the criminals hack into customers accounts to make changes or misuse the accounts.... Describe and analyse the range of computer related crimes and, based on this analysis, offer up some effective… technology is shaping our world....
15 Pages (3750 words) Essay

Information technology director security plan

If I was an information technology director, I would: Ensure the protection and management of information technology resources.... security is not primarily a technical or technological issue but is a management issue as the incidents of lax security and bank failures due to redundancies and other management errors have increased.... hellip; security is not primarily a technical or technological issue but is a management issue as the incidents of lax security and bank failures due to redundancies and other management errors have increased....
1 Pages (250 words) Coursework

Information Technology Security

Confirmation helps the privacy of information and the responsibility of activities performed on frameworks by checking the exceptional character of a client.... This paper ''Information Technology security'' tells that Methodology for information ought to be controlled through a method that ensures the client access rights for Spiderweb which reflect characterized and employment prerequisites.... But this appraisal demonstrates that the utilization of single-variable verification may be insufficient, it ought to execute confirmation, layered security, or different controls sensibly figured to alleviate the hazard....
12 Pages (3000 words) Essay

Information Technology: Surveillance Security

Organizations require advanced protection and security from these threats and vulnerabilities.... security is mandatory to protect anything that needs to be protected as 'www.... A definition associated with information and communication technology will demonstrate the concerns related to network communication privacy, confidentiality of data over the network, accessing unauthorized classified data, access to prohibited network domains and utilizing the Internet for concealed communication (Network security....
8 Pages (2000 words) Assignment

Information Technology Threats and Security

From the paper "Information Technology Threats and security" it is clear that The threats are explored like a virus, malware, malicious activities, etc.... The growing demand for dependency on information technology requires the high demand for the prevention of threats and improved security as McCarthy (2013) founded in his work on E-authentication.... There are many effective antivirus and internet security software that detect the latest threats....
6 Pages (1500 words) Assignment

Information and Communication Technology Management and Information Security

This paper "Information and Communication Technology Management and information security" examines different categories that can be used for sensitive information answering the question of when designing a system, how does one determine how many categories are necessary.... When designing a system the determination of the number of categories needed for information security depends on the type of information that is in the organization as well as the purpose of the organization or institution....
7 Pages (1750 words) Assignment

The InnoSensors Technology Company

… The paper "information security: InnoSensors Technology Company" is a worthy example of a case study on information technology.... nbsp;This research is about information security and specifically narrows down to the InnoSensors technology company that is about to launch a new health monitoring device and the aim of the research is to develop a security mechanism that is appropriate for the company.... The paper "information security: InnoSensors Technology Company" is a worthy example of a case study on information technology....
12 Pages (3000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us