With computer systems increasingly under attack, information security is more serious in user views. Security protects c
-
- Site Admin
- Posts: 899603
- Joined: Mon Aug 02, 2021 8:13 am
With computer systems increasingly under attack, information security is more serious in user views. Security protects c
by integrity. Availability assures efficiency of working and ability for recovery in disaster situations. The security of the overall system is restricted by the safety of its weakest link. Any single weakness can affect the security of the system entirely. The threats include web site defacement, network penetrations cause corruption and loss of data, denial of service attacks, viruses, Trojans and endless series of new stories proves that the threats are real. In fact, network security involves with three realities: first, the defender must defend against every possible attack, while the attacker only needs to find out one weakness. Second, the immense complexity of modern networks forms them impossible to secure properly. Third, professional attackers may encapsulate their attacks in programs, allowing ordinary people to use them. According to studies vulnerability assessments and intrusion prevention or intrusion detection are just one aspect of IT security management. However, due to recent developments with the continuing spread of network connectivity IT security management, is faced with yet another challenge, requiring a structured approach for an adequate response.
lestion 5 5.1 a. What technology do you think organisations should implement to help identify and thwart b. C. these threats? How does the technology you stated above really work? From the scenario and using your opinion. Motivate why is it important to use the technology you stated in 5.1? (2 marks) (8 marks) (15 marks)