Engineering And It

Read Complete Research Material



Engineering and IT

Engineering and IT

Topic 1

First thing that has to be kept in mind is that there must be some sort of limit that must be curtailing the access that is being provided to the organization data. The problem that is most commonly faced is that there is only one person that is responsible for the overseeing of the issue that might lead to lack of oversight. A failure and the lack of ability to do so might bring a situation that will lead to single person being able to subvert a process that is important to the organization (Lange & Oshima, 1999). The separation of the duties is thus very important as far as threat mitigation for the organization is concerned.

The thing that has been most commonly seen is that the ability of the inside actor as a whole to make sure that safeguard perimeters are being avoided. Some of the major traits about the data such as confidentiality and integrity of the overall organization also has a very important role as far as implementation of some of the rules and procedures is concerned.

Thus some of the threats that are being faced by the organization can easily be avoided if the saboteur has all of his accesses precisely and more importantly compartmentalized with the concern for the mandatory oversight (Lu et al, 2005). IF the saboteur is not permitted some of the ability to generate codes and also make sure that they are released into the production system. But the word of caution as far as threat mitigation is concerned is that some of the languages can be used to create scripts that are malicious in nature.

Topic 2

It has to be kept in mind that when one looks into the report and then compares it with the security system. It can be safely said that thus far no one has been able to make inroads into the more or less perfect system and has not been able to seriously damage the infrastructure that is in the place as far as security network is concerned (Greitzer et al, 2008). The possible concern is that some of the criminal syndicates as well as sometimes even an individual can thwart the security and protection of the network. And with some of the skilled hackers that are going around these days, it can be correctly said there is need for some security measures to solve this problem (Greitzer & Frincke, 2010).

As far as effectiveness of the approaches and taking preventer measures is concerned, it can be seen that there is a need for developing and strengthening some of the cyber security standards that are needed to be developed with the partnership that exists between the Government and the IT industry (Greitzer et al, 2008). The encouraging sign is that some of the IT industries are already making an effort to meet these standards and it augers well as far as the security of the system is ...
Related Ads