Information Security

Read Complete Research Material



Information Security

Abstract

In this paper, there is a discussion about the primary goals of network security, identification of main types of risks associated with network system, attacks on Information Systems, and Various controls against risks, recovery measures and conclusion.

Contents

Introduction4

Discussion4

Confidentiality4

Integrity5

Trojan horse Programs5

Denial of Service5

Unprotected Windows Shares5

Technical Risk6

Data Loss6

Non-Repudiation6

Security Measures7

Multiple Locations7

Edge Networks7

Improved Timeline of Response7

Threat Management8

Conclusion8

References9

Information Security

Introduction

Today, everyone is used to of using the computer and internet at their homes, offices and organizations. There is a lot of advancement in the technology within the last decade. This technology also brought some potential risks and threats to our computers. These risks are sometimes not ignorable. There may be severe attacks on computer through various ways, which include the access of hackers. There must be proper security in order to prevent the threats and viruses to attach the personal computers. These preventive measures assist us to stop the unauthorized person to access any way of our computers. This unauthorized person may be intruders. There should be detection which enables us to know that a person has entered into our system. If he accesses any part of our system then, we should know how successful he is in doing that and what he has done to our system.

Discussion

Confidentiality

“Risks and threats to Information Systems can be managed, by controls and Recovery measures”.

What are the risks associated with Information systems? How these risks can be controlled? What recovery measures should be taken in order to protect Information Systems from disasters?

Integrity

Primary goals of information security include the protection of information systems. With the advent of new technologies, it is becoming difficult and challenging to secure the information systems. Major goals of information security may include the reduction of risk from the systems. It has to ensure the information confidentiality of data resources. Information technology has to ensure the availability of information resource without any interruption and ensure compliance with policies.

Intruders are always trying to search new ways to access into the computers through “holes” into the computer software.

Trojan horse Programs

This is a way used by the intruders, to attack the personal computers. This is also called as “social engineering”. This is mainly due to installation of the back door programs. Intruders easily access our computers with the help of these programs without our knowledge and may infect our PCs with viruses.

Denial of Service

This is another form of attack normally called as DOS attack. This attack makes computer system so ...
Related Ads