IT and IS Security - Essay Example

Only on StudentShare

Extract of sample
IT and IS Security

The same can be said for mobile phones and digital storage media, where mobile phones are more than just a calling device, but also function as personal digital assistants with access to the internet and related applications. Likewise, storage media has progressed from floppy discs and compact discs, to USB or flash drives that can be attached to key rings.
Van Loggerenberg and Morne (2008) have also stated that our increased use of computers and digital media has increased our dependency on the proper functioning of such devices. This means that as more processes and procedures are carried out using IT/IS systems, we, as users lose our ability to deal with and possibly identify the vulnerabilities associated with these systems. Another possible reason suggested by Van Loggerenberg and Morne (2008) is that we place our trust in these systems, and this demonstrated by the existence of extensive internal intranet and online systems which business and personal users access to send highly sensitive information. It seems that there is a common belief that the systems are safe, and that they cannot be intercepted by any other third parties. However, this unwavering trust is also a potential source of the vulnerabilities that shall be discussed in this report.
Vulnerabilities associated with IT/IS security is therefore focussed on the trus ...Show more


IT/IS Security has recently become a major concern given that the use of information systems has rocketed. For instance, most processes and procedures can now be completed online; wireless and mobile broadband is also increasing in use; as is the adoption of information technology…
Author : kiehnhayden
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"IT and IS Security"
with a personal 20% discount.
Grab the best paper

Related Essays

Cloud Computing
This paper presents a detailed analysis of cloud computing technology. This paper discusses the technology structure, working, advantages and operational services of the cloud computing. This paper will also discuss some of the important issues which are presently hindering in the way of successful application of the cloud computing.
7 pages (1750 words) Research Paper
Network Security
Differentiated Services Field is not set. This byte was originally called the Type of Service (ToS) byte, but was redefined by RFC 2474 as the DS Field. It is used for marking packets for the purpose of applying different quality of service QoS) levels to different packets
10 pages (2500 words) Research Paper
Wireless Security
The wireless network market is a high-growth area with businesses eagerly wanting all the benefits that wireless can offer. Wireless networking is fast becoming a viable alternative for entities that can utilize the advantages it provides.
15 pages (3750 words) Essay
Premium engineering and manufacturing mark their wide range of RTG/RMG (gantry cranes), mobile quayside, ship-to-shore and straddle carrier telescopic spreader models. ELME reach stacker and forklift spreaders show limitless flexibility around the dock, stacking securely up to 8 high.
11 pages (2750 words) Essay
Online Security
But, it doesn't really matter if you use internet to get information or to shop around, you have to face certain security threats as there is an overwhelming increase in the cyber crime over the last few years. According to the FBI, the number of Internet crime complaints received in 2008 rose 33 percent from 206,884 to 275,284 at a total loss of $265 million.
7 pages (1750 words) Essay
Computer system Network Security
Information lost is regarded as financial loss. As organisations are implementing paperless media and computerizing data the need for securing data at various stages become essential. Data is stored in various modes both online and offline1. The data stored online and offline opens up a threat by falling trap to potential hackers who intrude into our systems or network
5 pages (1250 words) Essay
Biometric Security
The 9/11 attacks on WTC twin towers in the heart of the US, the bomb blasts in London, the 26/11 attacks in India are some of the heinous acts of terror which have forced the security agencies around the world to go for foolproof security measures. But this is resulting in double whammy for the common people.
14 pages (3500 words) Essay
Internet security
The figure is expected to double by 2016 and triple by 2025 (Schneider, 2000). Internet use has come to be embraced even from unlikely quarters with government adopting concepts such e-governance.
8 pages (2000 words) Essay
An Automated External Defibrillator
Each year over 150,000 UK people die from cardiac arrests. From 80s the problem was addressed with Automated External Defibrillators (AEDs) which could interpret heart rhythm and deliver a defibrillation shock. Now AEDs are placed in public locations - airplanes, airports, shopping malls, stadiums, casinos, exercise facilities, office buildings.
2 pages (500 words) Essay
Find out how much would it cost
to get a custom paper written by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email