Answer to Question #203966 in Management for Yonatan Elias

Question #203966

Even if IT is giving a lot for the business world, it has also posed a very serious IS security

threat.

a. List at least three factors or computer crimes contributing to information security

threats.

b. Discuss three of the mechanisms that address information security challenges.


1
Expert's answer
2021-06-08T05:23:24-0400

Computer Crimes Contributing to Information Security

           Despite Information Technology (IT) providing a lot of benefits to the world of business, it also comes up with a very serious threat to the security of the information. The threat that is associated with the information technology is losing the information to the unauthorized hand where it can be used for other purposes despite the intended ones by the owner of the information (Hill & Marion, 2016). This paper discusses the factors that contribute to information security, it also discusses the mechanisms that address the information security challenges.

Factors contributing to information security

           Unauthorized Access. In a networked system, this is the most common threat, it involves the access of information by unauthorized people and computer resources, information technology systems (Madakam & Dates, 2016). It leads to a loss of integrity, privacy, and the accessibility of information technology resources.

Denial of service (Dos). It refers to the attack which is meant to shut down a machine or network by making it unreachable to its proposed users (Madakam & Dates, 2016). These assaults are accomplished by overflowing the target with traffic or transferring the information that activates the crash.

Excess privilege. This privilege causes information security as the users have excessive privileges and excessive access to data.


Mechanisms that address information security challenges

           Decipherment. This is a security mechanism that deals with the hiding and covering of data; hence the data becomes private and cannot land into unauthorized hands (Pelker et al., 2015). The documents are written in ancient languages whereby its hard deduces by a person who is not familiar with the information.

Digital signature. (Madakam & Dates, 2016). The information can be protected by introducing the digital signature mechanism, which is a mathematical technique that is used to legalize the authenticity and reliability of communication, software, or a paper that is digital.

Data Integrity. It refers to the accuracy and consistency of data over its life cycle (Pelker et al., 2015). Data integrity can cooperate in several ways each time the data is simulated or transferred; hence it remains intact and unaltered amongst updates.








References

Hill, J. B., & Marion, N. E. (2016). Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century: Computer Crimes, Laws, and Policing in the 21st Century. ABC-CLIO.

Madakam, S., & Date, H. (2016). Security mechanisms for connectivity of smart gadgets in the internet of things. In Connectivity frameworks for smart devices (pp. 23-41). Springer, Cham.

Pelker, C., Palmer, A. J., Raia, B., & Agosti, J. (2015). Computer crimes. Am. Crim. L. Rev.52, 793.


       


Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Comments

No comments. Be the first!

Leave a comment