Information Technology Security or Electronic Information Security

Cyber-security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.

Don't use plagiarized sources. Get your custom essay on

“Information Technology Security or Electronic Information Security”

Get custom essay

  •  Network security is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware.
  • Application security focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed.
  • Information security protects the integrity and privacy of data, both in storage and in transit.
  • Operational security includes the processes and decisions for handling and protecting data assets. The permissions users have when accessing a network and the procedures that determine how and where data may be stored or shared all fall under this umbrella.
  • Disaster recovery and business continuity define how an organization responds to a cyber-security incident or any other event that causes the loss of operations or data. Disaster recovery policies dictate how the organization restores its operations and information to return to the same operating capacity as before the event. Business continuity is the plan the organization falls back on while trying to operate without certain resources.
  • End-user education addresses the most unpredictable cyber-security factor: people. Anyone can accidentally introduce a virus to an otherwise secure system by failing to follow good security practices. Teaching users to delete suspicious email attachments, not plug in unidentified USB drives, and various other important lessons is vital for the security of any organization.

As the technology is increasing day by day, many people fall victim to cyber theft. This high development of technology and the availability of internet to most of the public, broadens the pathway of cyber-crime. Cyber-Security was once not a serious issue. But now many people are complaining about their credit card information getting stolen or sudden drop of credits in their bank account.

The internet has become the integral part of today’s generation of people. Many people share their information out in the web through social networking sites like Facebook, Twitter, Instagram etc. Internet has touched every aspect of life right from the beginning to the present. As people share their personal information online; most of their accounts get hacked by cyber-criminal or in other word’s black hat hackers. And, trusting internet nowadays isn’t a wise thing to do.

With the growing use of the internet by people, protecting sensitive information has become something which must be taken into consideration, quite seriously. Otherwise, the internet can be one of the dangerous places to visit if one’s sensitive information isn’t being protected. If a computer doesn’t have proper security controls then it has high chances of getting infected by malwares, malicious logics and hence, any type of information in that computer can be accessed easily within moments. And, there are many millions of websites on internet which are infected with malwares and spy-programs. Which allows a hacker to gain illegal access to the specific computer, once the computer has browsed the domain name of the malicious website or if the spy-program is downloaded into the computer. It is very important to stay secure while you are online or else it might be very risky to lose your personal information.

Cyber-attacks can be caused due to negligence and vulnerabilities. One can be a victim of cyber-attack due to his own ignorance of the vulnerabilities which his system shows. Which also means that one can stay secure online by blocking ways by which a hacker can come. He can do this by installing an anti-virus (such as, Avira, Norton, Macafee, Kaspersky etc.), updating the application which he uses for browsing internet etc. Few other ways are, not surfing websites that isn’t secure. Well, this might sound a minor thing. But, it’s one of the most important things which must be followed in order to stay secure online. According to a study conducted on 2012, most of the internet users don’t bother whether the website they visit is secured or not. Due to this, many of the information registered on the website gets duplicated. Such as, credit card initials while making a purchase, their official e-mail password while linking their account. All these can prove fatal if the hacker gets all this personal information.

One more thing what a person can do to stay secure is; by not clicking a link or downloading an application, which is sent via mail to him by an un-authorized person. If the e-mail shows up in spam folder then also, he shouldn’t open it. In case, if the person downloads the application then his anti-virus must be turned on, in order to scan the downloaded application. Otherwise, his PC could be vulnerable to viruses and malware program. If he doesn’t have an anti-virus and he downloads the application, then what’s going to happen is; his monitor screen suddenly flashes and shuts down. And, when he restarts his PC, he notices that it doesn’t function as it used to before. These symptoms are cause of the presence of virus inside his desktop.

We as a human tend to ignore things most of the time. And, this can be very dangerous when it comes to surfing web online and downloading applications. Hackers make use of paths which we tend to ignore. And, most of the attacks which we receive from them can be brutal. In earlier this year, there were a team of black hat hackers who created a ransomeware ware called Wannacry. Within moments of its release to the internet, many multi-million companies including FedEx and Amazon faced huge loss. This ransomeware is so powerful that it spreads through a connected network.

For example, you have logged into some website and you see an add which says ‘ Click here to win $ 20,000. Only few contestants will be chosen for this draw. Hurry!! ‘. So, due to your interest in the draw. You tend to click it. So, while you are directed to another website through the link; a new application gets downloaded without your notice and it intiate’s the launch of its written commands. Your screen flashes in a moment and all you notice is a message saying that ‘ All your files have been encrypted and in order for you to decrypt it, you will have to pay a sum of $300 in bitcoins. If you don’t make a payment within 3 days to the give address, then the amount will be double for each day. If you are unable to make the payment within 7 days then, all your files will be lost! ‘. This is exactly what happens when Wannacry ransomeware gets into your computer.

Nowadays hackers are so good in their field. That, they wipe out traces of crime in such a way; that it is almost impossible to find the cyber-criminal. If you are one of the targets of a hacker. He always tries his best to keep track of you. And, once you fall into his hands then that’s the biggest mistake you have ever made. If a hacker gets into your network, say Wi-fi then he can manipulate its security setting and also have detailed log about your browsing. He can also get access to the devices that are connected to your Wi-fi. And, in case if one of your computers has your personal information then he can access it within moments. In order, to get around this issue of a hacker getting in your home network; first, you should make sure that all the devices connected into your network are all trusted devices. And, it is recommended that you must have a strong WPA2 security password. Or else, if you are using any other security type like WEP, then the password can be cracked within minutes. The next step is to regularly update your routers firmware (security settings). Regularly updating router’s firmware can literally keep hackers from getting into your network. Also, keep in mind that if you disable your firewall then no matter how much you update your firmware. It’s of no use until your firewall is enabled.

Normally, what firewalls do is; they block the data coming from outside the network. They pretend as a thick layer of filter that denies the penetration of un-wanted or harmful data that comes from the internet. So, in order to have a strong firewall, all you need to do is block all the outbound connection and allow all the inbound connection. This makes sure that the data on the internet can be accessed through inbound connection. But no user will be able to penetrate into you network unless and until he is connected to your network. Meaning, blocking the outbound connection, you make the firewall stronger in such a way that other users who aren’t connected to your network won’t be able to access your files or see the devices connected to your network.

I would like to conclude by saying that, there is no 100% security in today’s era. Nor, will there be in the future. So, don’t expect an un-authorized user not to have accessed your files if connected to your network. Or in other words, don’t think that they can’t access any of your files. And, always update your systems and network’s security settings. Always make sure that your anti-virus performs full-system-scan every week. So, that your desktop stays virus and malware free.  

Did you like this example?

Cite this page

Information Technology Security or Electronic Information Security. (2022, Aug 30). Retrieved October 7, 2022 , from
https://studydriver.com/information-technology-security-or-electronic-information-security/

Save time with Studydriver!

Get in touch with our top writers for a non-plagiarized essays written to satisfy your needs

Get custom essay

Stuck on ideas? Struggling with a concept?

A professional writer will make a clear, mistake-free paper for you!

Get help with your assigment
Leave your email and we will send a sample to you.
Stop wasting your time searching for samples!
You can find a skilled professional who can write any paper for you.
Get unique paper

Hi!
I'm Chatbot Amy :)

I can help you save hours on your homework. Let's start by finding a writer.

Find Writer