Cracking the Code the Contemporary Issue of Essay

Total Length: 3543 words ( 12 double-spaced pages)

Total Sources: 8

Page 1 of 12

Cracking the Code

The contemporary issue of physical security/IT security

Modern day businesses and organizations face the contemporary issue of physical security/IT security. Whether a business needs to maintain network security for a website or server, or an organization needs to restrict access to a server room, there are several aspects facing the problem of dealing with IT security. Any general computer networking instructor teaches the DOD and/or OSI networking models and from this IT professionals understand that everything start from the bottom, like with the physical level. Therefore, IT professionals tasked to handle IT security, must base their foundation or overall strategy in IT security management on the physical security of software, hardware, and equipment.

Some organizations forget the importance of physical security in an IT security setting may become distracted by the safeguarding features of certain software-based security merchandise and overlook the significance of protecting the network and all its components at the base level, the physical level. Research lends to current applications being ineffective. "Existing security approaches are either inapplicable, not viable, insufficiently scalable, incompatible, or simply inadequate to address the challenges posed by highly complex environments such as the smart grid" (Li, Cheng, Zhang & Tong, 2013, p.637). Besides the maintenance software, the "white hat" hackers, the trained personnel, and the software meant to eradicate any potential threats, physical security like addition of security guards, becomes an important step in producing successful results in the field of IT security. The essay will the physical and technical aspects of IT security; how it relates to physical security, from two different perspectives. Physical security/IT security can become a great way to not only allow for inclusion of security personnel in businesses, but also allow for the growth of the security field in the ever-expanding IT part of business and commerce.

The contemporary issue of physical security/IT security

What is IT security? First, it is important to look at the various aspects of IT security as discussed in the introduction. Things like viruses and hackers have become an all too common occurrence within the IT world. However, some people may not know how hackers or "black hat" hackers get the information needed to break into high security servers and websites. An article on hacking discusses the low-tech ways and techniques in which hackers gain the sensitive information needed to hack into businesses and organizations.

The first step comes from acquiring the information from an employee or personnel from a business organization. Sometimes a simple phone call allows the would be hacker access to information that can lead to password cracking and identifying who in the organization or business may be in charge of IT security. From there, hackers can trick people into giving those things like their mother's maiden name, where they live, and even very sensitive information like a social security number. Hackers are ingenious at times and can easily thwart efforts of businesses and organizations that attempt to deal with IT threats.

The second step comes from infiltration. Hackers or other people seeking to steal private information from businesses or organizations tend to go there and/or physically speak with personnel, sometimes pretending to be personnel or installation/service workers. They may then steal hardware like laptops and hard drives containing sensitive information, or may physically hack into their systems from a place in the building that could have access to secure servers. In essence, there is a variety of ways and methods into which a hacker, for instance, can gain access to IT related information and then wreak havoc digitally. Therefore, security guards at strategic checkpoints may play a crucial part in IT security.

IT security in the sense of physical security may not seem like a crucial part of the IT industry at first. However, that is far from true. IT security enables businesses like those in the video game industry to keep online pirates and hackers from stealing their video games and sensitive information from the public before a release of a game or update. Often people will try to hack popular video game companies in order to gain access to undisclosed plots and stories, leading to millions in video game sale losses should this occur. An article discussing IT security problems, explains the importance for such measures within the video game industry. "IT security issues are an important aspect for each and every organization within the video game industry. Within the video game industry alone, you might not normally think of security risks being an issue. But as we can and have seen in recent news, no company is immune to security risks no matter how big or how small" (Mohr & Rahman, 2011, p. 1).

Aside from the "burglars and pirates" of the tech industry, there are other aspects of security that businesses often encounter.

Stuck Writing Your "Cracking the Code the Contemporary Issue Of" Essay?

Vandalism can happen for many reasons. There could be a protest, a rally, something happening in relation to politics and so forth. Vandals can come and not necessarily steal, but damage any of the hardware and equipment in a building. An instance in a college in NYC had vandals come from a different university to break windows, computers, and ruin the hallway because of a protest the students wished to participate in. Although the incident did not result in any serious injuries, thousands of dollars in computer equipment were destroyed. Things like this can happen anywhere.

An article discussing heuristics, discusses how participants may evaluate IT security tools for increased efficacy.

Participants who used the ITSM set found more problems categorized as severe than those who used Nielsen's. We analyzed several aspects of our heuristics including the performance of individual participants using the heuristic, the performance of individual heuristics, the similarity of our heuristics to Nielsen's, and the participants' opinion about the use of heuristics for evaluation of IT security tools (Jaferian, Hawkey, Sotirakopoulos, Velez-Rojas & Beznosov, 2014, p. 311).

Although physical security of IT related locations may be different. It can still be a means to consider evaluation of physical security in IT locations. If businesses or organizations saw the importance and need for increased physical security, the demand for such employees may increase.

There is a need for physical security within the IT industry. Video games, software developers, they have all generated enough business to build offices both nationally and internationally. To protect from potential thieves, hackers, and pirates, the most important aspect of IT security, physical security, must be implemented in various stages from access into a building or office to additional security for important sections like the server room or main computer room. Things like security cameras and sign in sheets may assist security offices in identifying potential hazards and assist law enforcement in tracking any suspects.

There are a total of three main aspects or components to physical/it security. For instance, any kind of obstacle a security company or officer can place in order to prevent potential thieves and attackers from getting through into the interior where the business or organization keeps the hardware/software/equipment. Measures include various locks, walls, fencing, water sprinklers (fire), fireproof safes (explosions, bombs), and even security gates that detect weapons or anything metal. Second, notification and surveillance systems, put in place, like heat sensors, lighting, smoke detectors, alarms, intrusion detectors, and cameras all show, record, and provide an additional la all show, record, and provide an additional layer of physical security. Finally, techniques in apprehending attackers (preferably without any damage done) and recovering quickly from vandalism like fires and even just natural disasters. Natural disasters like Hurricane Katrina can wreak havoc and cause massive damage to electrical and computer equipment.

Discussing the issue from two viewpoints

Working within the IT Industry

From working as a computer analyst to working as a graphics designer, many in the IT industry believe the importance of security in safeguarding sensitive information and preventing system attacks and physical attacks. Employees in company's like Google INC. value physical security and the benefits a system integrating both IT security and physical security can have. One of the first benefits is better attack prevention.

There are hosts of problems that may happen when it comes to IT. As earlier mentioned, hackers come in all forms from online attacks, cyber-attacks like shutting down websites or physical attacks like going into the company and obtaining personal information of employees or the company or organization itself. Having additional support for threat detection removes the strain on IT specialists and allows them to focus on cyber-attacks. It also allows for better task management as things are effectively streamlined like surveillance and guest registration.

Maintenance for IT workers comes often during the after-hours of a business schedule. These are often the prime times for attackers to come and do their damage. Physical security keeps IT workers safe during these important times. With personnel there to safeguard the workers and the computer equipment, the company or organization experiences a higher level of safety.

A business requires quick recovery from attacks. Integration of a physical….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Cracking The Code The Contemporary Issue Of" (2015, January 24) Retrieved May 11, 2024, from
https://www.aceyourpaper.com/essays/cracking-code-contemporary-issue-2148149

Latest MLA Format (8th edition)

Copy Reference
"Cracking The Code The Contemporary Issue Of" 24 January 2015. Web.11 May. 2024. <
https://www.aceyourpaper.com/essays/cracking-code-contemporary-issue-2148149>

Latest Chicago Format (16th edition)

Copy Reference
"Cracking The Code The Contemporary Issue Of", 24 January 2015, Accessed.11 May. 2024,
https://www.aceyourpaper.com/essays/cracking-code-contemporary-issue-2148149