Information Technology Security Over the Last Several Essay

Total Length: 1389 words ( 5 double-spaced pages)

Total Sources: 4

Page 1 of 5

Information Technology Security

Over the last several years, the Internet has evolved to the point that it is a part of any organizations activities. As both governments and businesses are using this new technology, to store as well as retrieve significant amounts of information. However, this heavy reliance on various IT related protocols are having adverse effects on these organizations. As they are facing increasing amounts of threats from cyber criminals that are seeking to exploit a host of weaknesses. A good example of this can be seen by looking at statistics that were compiled by the FDIC. They found, that in third quarter of 2009 there was $120 million stolen (from governments and corporations), out of this number small business lost $25 million. This is significant, because it shows how the tremendous reliance on IT-based technology, is increasing the overall vulnerability that these organizations are facing. To fully understand how an entity can protect itself requires: examining the problems, solutions to address them, the impact of the Internet on the organization's security, examining RAID fault tolerance and recommendation of what products / services should be utilized. Together, these different elements will provide the greatest insights, as to the overall scope of the challenges and solutions all organizations will face.

The Issues that Organizations will Face on the Internet

The overall challenges that an organization will have on the Internet is from: malware, botnets and spyware. Malware is a type of software program that will infect a computer system, without the owner knowing that this occurring. Botnets are a collection of software programs (called bots) that are designed to seek out and find vulnerabilities in a host of different computer systems. Spyware is similar to malware, in that it is software that will attach itself to another computer without the owner's knowledge. Criminals are using these different tools to: seek out and attack vulnerable computer systems. Where, they will use various social networking sites, to identify organizations that could have possible vulnerabilities. At which point, they will use one or a combination of them to steal sensitive information.

Stuck Writing Your "Information Technology Security Over the Last Several" Essay?

This is important, because it shows how the biggest problem facing governments and businesses are unknown security breaches. Once this takes place, it means that there is the possibility that sensitive pieces information could fall into the hands of criminals or spies. ("The Effects of Spyware, Malware and Botnets," 2010)

Solutions to Address the Problem

The biggest problem that all organizations are going to face is, preventing security breaches from occurring. Part of the reason for this, is because human beings are the largest risk, as they will require outside access to the various tools including: e-mail, telnet, FTP, web-based systems and remote login. This is problematic, because it means that hackers can exploit this weakness, in order to gain access to sensitive information.

As a result, a comprehensive security protocol needs to be created that will address: the organization's security technology, policies / procedures, awareness and training. One way that this can be accomplished is through interconnecting the different tools together. As far as security technology is concerned, this means that a number of different tools can be used to help protect sensitive data from possible breaches to include: encryption, the use of bio metrics, multiple personal identification verifications and firewalls. ("Guide to NIST Information," 2010)

The Impact of the Internet on the Organization's Security

The Internet is having a tremendous impact upon the security of an organization. This is because, the increasing reliance on computers and other technology (for storing information), has caused many businesses as well as governments to face a host of unprecedented threats. This has lead to a shift, in the way an organization is looking at and addressing their security needs. Part of the reason for this, is because many entities are fearful of the possible fall out that occurs when this kind of situation takes place. In the case of businesses, this could mean that they may lose customers or have their reputation damaged. As far as governments are concerned, this could lead to a public relations disaster and political fallout. A good example of this.....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Information Technology Security Over The Last Several" (2011, January 22) Retrieved May 15, 2025, from
https://www.aceyourpaper.com/essays/information-technology-security-last-several-49503

Latest MLA Format (8th edition)

Copy Reference
"Information Technology Security Over The Last Several" 22 January 2011. Web.15 May. 2025. <
https://www.aceyourpaper.com/essays/information-technology-security-last-several-49503>

Latest Chicago Format (16th edition)

Copy Reference
"Information Technology Security Over The Last Several", 22 January 2011, Accessed.15 May. 2025,
https://www.aceyourpaper.com/essays/information-technology-security-last-several-49503