Even if IT is giving a lot for the business world, it has also posed a very serious IS security
threat.
a. List at least three factors or computer crimes contributing to information security
threats.
b. Discuss three of the mechanisms that address information security challenges.
Computer Crimes Contributing to Information Security
Despite Information Technology (IT) providing a lot of benefits to the world of business, it also comes up with a very serious threat to the security of the information. The threat that is associated with the information technology is losing the information to the unauthorized hand where it can be used for other purposes despite the intended ones by the owner of the information (Hill & Marion, 2016). This paper discusses the factors that contribute to information security, it also discusses the mechanisms that address the information security challenges.
Factors contributing to information security
Unauthorized Access. In a networked system, this is the most common threat, it involves the access of information by unauthorized people and computer resources, information technology systems (Madakam & Dates, 2016). It leads to a loss of integrity, privacy, and the accessibility of information technology resources.
Denial of service (Dos). It refers to the attack which is meant to shut down a machine or network by making it unreachable to its proposed users (Madakam & Dates, 2016). These assaults are accomplished by overflowing the target with traffic or transferring the information that activates the crash.
Excess privilege. This privilege causes information security as the users have excessive privileges and excessive access to data.
Mechanisms that address information security challenges
Decipherment. This is a security mechanism that deals with the hiding and covering of data; hence the data becomes private and cannot land into unauthorized hands (Pelker et al., 2015). The documents are written in ancient languages whereby its hard deduces by a person who is not familiar with the information.
Digital signature. (Madakam & Dates, 2016). The information can be protected by introducing the digital signature mechanism, which is a mathematical technique that is used to legalize the authenticity and reliability of communication, software, or a paper that is digital.
Data Integrity. It refers to the accuracy and consistency of data over its life cycle (Pelker et al., 2015). Data integrity can cooperate in several ways each time the data is simulated or transferred; hence it remains intact and unaltered amongst updates.
References
Hill, J. B., & Marion, N. E. (2016). Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century: Computer Crimes, Laws, and Policing in the 21st Century. ABC-CLIO.
Madakam, S., & Date, H. (2016). Security mechanisms for connectivity of smart gadgets in the internet of things. In Connectivity frameworks for smart devices (pp. 23-41). Springer, Cham.
Pelker, C., Palmer, A. J., Raia, B., & Agosti, J. (2015). Computer crimes. Am. Crim. L. Rev., 52, 793.
Comments
Leave a comment