Today, the era is of revolution and technology. Each day brings new ideas and discoveries. Technology is advancing day by day and with the advancement of technology there are certain risks and disaster associated with this technology. There is always a chance that any emergency and disaster can occur anytime in organizations. There are other disasters too, which are due to the Network Security such as hackers, human errors, power failures and viruses.
Discussion
“Risks and threats to Network Systems can be managed, by controls and Recovery measures”.
What are the risks associated with Network systems? How these risks can be controlled? What recovery measures should be taken in order to protect Information Systems from disasters?
Goals of Network Security
Primary goals of network security include the protection of information systems. With the advent of new technologies, it is becoming difficult and challenging to secure the information systems. Major goals of information security may include the reduction of risk from the systems. It has to ensure the information confidentiality of data resources. Information technology has to ensure the availability of information resource without any interruption and ensure compliance with policies.
Risks
There are certain risks associated in each organization with the advancement in information technology such as downtime when Information System is not available. Some time to overcome of these risks become expensive. According to the report, $4 billion lost in U.S due to these risks.
Risks to Hardware
There are certain risks, which may cause with hardware such as major damage to the machine due to natural disasters. Black outs and burnouts may other reasons of failure of hardware. These includes total loss of electricity which is the black and sometimes, partial loss of electricity which is brown out. This is also due to the uninterruptible power supply (UPS), and deliberate destruction occurs in various cases.
Risks to Data and Application
The risks associated with the data and applications are mainly destruction, theft and damage. Data can be hacked while transferring from one place to the other. For instance, Amazon.com transferred its data into the cloud which was hacked by hackers. Several servers went offline at once. They raised certain questions regarding security at that time. Cloud computing is adversely affected by the threats due to these hackers and intruders. They can attack personal computers by sending viruses and email spoofing. Various cases have been seen of hacking which can hack the useful information and leak. Leakage of useful abstract brings certain disadvantages to the companies. That is why companies are slow in adopting new techniques of technology, such as cloud computing, in which there are more risks than benefits in certain cases. According to the survey of 1800 U.S IT professionals 48% of them think that risks are associated with cloud computing is more than benefits. In certain cases, websites of companies are the victims of hacker. Privacy is the major concern in each organization, and if data is not secured then, companies loss their confidence in giving useful information into the ...