IT Security: The Problems Analysis Research Paper

Exclusively available on Available only on IvyPanda® Made by Human No AI

Information Technology has always been a source of information that requires vigilance due to its ability to affect its users’ lives drastically. Not only can one communicate and share conversations, documents, pictures, etc. throughout the world, there is also private and confidential information stored that is not ought to be shared. The problem I’m investigating is called hacking, which essentially means gaining unauthorized access to someone’s private and confidential information.

A major problem like Hacking for IT and its related fields is hazardous to the security of organizational secrets since if a person can gain access to confidential information, that information can be used for personal gains. If not used, the intruder could also harm that information making it useless or misleading the actual users of that information.

There is a common philosophy in the computer world that “if you can make it, you can break it”. This philosophy is often used to describe the mentality of hackers who think that if a program can be made, it can be unmade. The virus industry has boomed because of this philosophy as viruses keep on coming in while the anti-virus companies keep on building their cures. Since hacking is a technological problem just like viruses, this problem can also be fixed through a technological solution.

In search of information regarding ‘hacking’ and its solutions, I visited the www.infosyssec.com website. The website from the outlook looks cluttered and heavily textual. However, being a Meta website, this is a feature expected from such sites. With long pages full of new links and information, the first impression was of a page crammed with the meaningless information. However, the interface helps to clear out the mess in a second. The left side panel clearly describes the website’s research facilities and projects. It contains links of information relevantly titled with their headings and contains guides for certain researches.

The guide on the website proved to be an effective framework to prevent hacking. The first and foremost thing to do is to implement a firewall. A firewall, as the name suggests, acts like a barrier that only allows authorized entry into the network. Also having an updated anti-virus keeps the viruses at bay that may help in allowing hackers to gain entry into the network. Furthermore cookies should be disabled; no passwords must be saved on the computer; auto-complete wizards must be turned off and the history should be erased after each use. Most hacking is done through a Trojan virus installed from a source unknowingly thus care must be taken that when downloading software from the internet or installing programs they must originate from authentic and trustworthy sources.

The best solution for me would be to install an anti-virus program and keep updating it regularly so that my computer and network is secure from Trojans and backdoors that allow hackers to gain access to my data. Although most people would opt for a firewall as first priority, I would choose the anti-virus since it would serve multiple purpose of keeping spywares and viruses from my computer at the same time making it more secure from intrusion.

The website proved to be quite useful in the end. Although at times the website looked unstable and I found a few broken links, there was still a lot of information that could be used for other problems too. My first impression of a cluttered website was replaced by the impression of a informative website. Such websites are one window stops for the users as all information can be taken from only one source. Thus I believe that this website fulfills the needs of the users of any need related to information technology.

Where science has given us various tools and techniques to help us tackle many problems, it also has given a weapon to the people to chance their evil on others. However technological problems can only be solved using technological solutions since science created them and only science can put an end to them.

References

The Security Portal for Information System Security Professionals. (n.d). Business Continuity and Disaster Recovery Planning. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, March 5). IT Security: The Problems Analysis. https://ivypanda.com/essays/it-security-the-problems-analysis/

Work Cited

"IT Security: The Problems Analysis." IvyPanda, 5 Mar. 2022, ivypanda.com/essays/it-security-the-problems-analysis/.

References

IvyPanda. (2022) 'IT Security: The Problems Analysis'. 5 March.

References

IvyPanda. 2022. "IT Security: The Problems Analysis." March 5, 2022. https://ivypanda.com/essays/it-security-the-problems-analysis/.

1. IvyPanda. "IT Security: The Problems Analysis." March 5, 2022. https://ivypanda.com/essays/it-security-the-problems-analysis/.


Bibliography


IvyPanda. "IT Security: The Problems Analysis." March 5, 2022. https://ivypanda.com/essays/it-security-the-problems-analysis/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1