Information Technology Systems Architecture

Information Technology
2 min, 51 sec read Download Article

Architecture of IT Systems

This is a conceptual model which defines the components, structure, behavior, and view of the system. It defines everything which is necessary to secure information in a company. 

Types of Threats

There are dozens of information security threats. However, some types are more popular than others. Some common types include Trojan, virus, worms, spyware, botnet, phishing, and DDoS (Solms et al., 2013). These are common types of threats which attackers utilize to compromise information. They, therefore, pose constant threats to the company and should be aware of various methodologies to address them.

Security Mechanisms

The firm has employed numerous security mechanisms to address each of the threat to its information security.

Table

Components

Common Threats

Likelihood of Happening

Security Mechanisms

LAN Security

Viruses, email attachments, Trojan horses, Worms, and Probes.

X

The company should maintain a robust security firewall, conduct regular network scans, limit remote access, ensure information is well encrypted, and keep all software update.

Identity Management

Insider threats, hacking

X

Encrypt data, update systems regularly, and destroy all traces of data from hardware you intend to offer third-party users, have strong passwords and other authorization mechanisms.

Physical Security

 Fire, flood, natural disasters, burglary, theft, vandalism, and terrorism

X

Cloud storage and backup.

Personal Security

Thuggery, assault.

X

Encryption and passwords.

Availability

Phishing, defacement

X

Installing anti-phishing software, use firewalls, keep latest browser version, install antivirus software.

Privacy

Cookies proliferation, seizing cloud data, location tracking

X

Disable cookies, put up firewalls, strong passwords, and secure all hardware, and keep sensitive data out of the cloud.

 

Cyber attacks

Theft of sensitive data

A significant volume of data in any firm needs protection, but there are others which require extra caution. Therefore the company pays extra attention in putting up a defense mechanism. Some of the defense mechanism includes; encrypting all sensitive data to ensure it is never accessed by unauthorized parties. That can be enabled by using hard to crack passwords and update security software. These three defenses ensure that sensitive data is well protected and within reach of authorized company personnel only.

Gaining unauthorized access

Encryption is the first defense mechanism employed in locking out unauthorized access to information resources, keeping off any unauthorized access (Brakerski & Vaikuntanathan, 2014). Secondly, ensuring all information resources is password protected. For instance, all laptops should have passwords; on top of that every file should be encrypted using pass codes. In extreme cases, employ stenography where you hide data inside other data. For instance, you can hide text data in a .jpg file. However, even in that encryption method, ensure the data is still password protected from even those who might access the files where you have hidden other files.

Sniffing passwords

1.      One approved method of preventing sniffing is by using encryption. For instance, if the client is connected in a web-based application, then one can use HTTPS-encryption to avoid any form of sniffing information that is put up in the system. Alternatively, a monitoring software can alert the information security apparatus whenever there is a suspicious action on the system.

Plan of Protection

Information

Identity

The use of the typical access card will resolve the issue of identity. Every employee is supposed to the user his or her card, with personal details that cannot be used by anyone else. The picture, name and the organization will ensure the identity of all those who access company resources is well documented. That can be backed up by individual authorization to prevent cases of impersonation.

Share this post:

Cite this Page

APA 7
MLA 9
Harvard
Chicago

GradShark (2023). Information Technology Systems Architecture. GradShark. https://gradshark.com/example/information-technology-systems-architecture

Finding it challenging to complete your essay within the given deadlines?