.

Thursday, April 18, 2019

Security practices not meeting the challenges (info technology) Essay

Security practices not meeting the challenges (info technology) - Essay Example in that location is a long line of self-interested intruders ready and willing to capture this valuable data, and as our reliance on digital information has grown, so keep the threats. Large concentrations of data, mobile devices, and the invite to keep the data recyclable has all added to the vulnerability of our information technology. objet dart our information ashes has worked to make our data more secure, the threats of flak and the divulging of information has become ever more prevalent. Information security is an ongoing process that can never quite meet the challenge of the security threats.Security threats originate from three sources. There are midland threats from corrupt employees, external threats that originate from external attacks on the system, and system failure. While direct attacks may via media the data, system failure can cause a loss of information or system shutdown. While developing a system of retrieve control minimizes attacks, system failures are dealt with through a system of redundancy and audit tracking. These systems are open to compromise by direct attack or closely meaning employees that practice lax security measures.The security of a database or network practically begins with access control. At the system level this may mean the use of passwords. Passwords are easily compromised and are often shared for the purposes of convenience. Levels of granting only necessary access to a system or a file have been more helpful as data is made available only on a need to know basis. However, in a fast paced team environment, this may require man-hours that far exceed the living value of the security. According to Hu, Ferrariolo, and Kuhn, If a single permission is incorrectly configured, a user will all be ineffective in performing his/her duties or will be given access to unplanned information and systems, which could result in undermining the security posture of the organization (36).

No comments:

Post a Comment