In this paper, there is a discussion about the primary goals of network security, identification of main types of risks associated with network system, attacks on Information Systems, and Various controls against risks, recovery measures and conclusion.
Contents
Introduction4
Discussion4
Confidentiality4
Integrity5
Trojan horse Programs5
Denial of Service5
Unprotected Windows Shares5
Technical Risk6
Data Loss6
Non-Repudiation6
Security Measures7
Multiple Locations7
Edge Networks7
Improved Timeline of Response7
Threat Management8
Conclusion8
References9
Information Security
Introduction
Today, everyone is used to of using the computer and internet at their homes, offices and organizations. There is a lot of advancement in the technology within the last decade. This technology also brought some potential risks and threats to our computers. These risks are sometimes not ignorable. There may be severe attacks on computer through various ways, which include the access of hackers. There must be proper security in order to prevent the threats and viruses to attach the personal computers. These preventive measures assist us to stop the unauthorized person to access any way of our computers. This unauthorized person may be intruders. There should be detection which enables us to know that a person has entered into our system. If he accesses any part of our system then, we should know how successful he is in doing that and what he has done to our system.
Discussion
Confidentiality
“Risks and threats to Information Systems can be managed, by controls and Recovery measures”.
What are the risks associated with Information systems? How these risks can be controlled? What recovery measures should be taken in order to protect Information Systems from disasters?
Integrity
Primary goals of information security include the protection of information systems. With the advent of new technologies, it is becoming difficult and challenging to secure the information systems. Major goals of information security may include the reduction of risk from the systems. It has to ensure the information confidentiality of data resources. Information technology has to ensure the availability of information resource without any interruption and ensure compliance with policies.
Intruders are always trying to search new ways to access into the computers through “holes” into the computer software.
Trojan horse Programs
This is a way used by the intruders, to attack the personal computers. This is also called as “social engineering”. This is mainly due to installation of the back door programs. Intruders easily access our computers with the help of these programs without our knowledge and may infect our PCs with viruses.
Denial of Service
This is another form of attack normally called as DOS attack. This attack makes computer system so ...