Information technology security

Information Technology Security

It is the protection of computer, networks from hack or protection of their software and hardware from any type of damage.
This is also termed as “Cybersecurity” or “Computer Security” or Information Technology Security.
This branch has gained so much popularity and still becoming more important due to the increase in digital technology such as
✓ Computer Systems
✓ Internet
✓ Wireless Network.
and one more important factor that is an increase in smart devices that is smartphones and other stuff.
This is the most important and challenging factor in today’s technology. and the world can’t escape from this.
Well, let’s describe it more precisely.

Attacks, Security breaches and its impact

Nothing is 100 % perfect in this universe, the same situation is with this. There is some weakness in their construction, implementation and control system. These weaknesses are termed as “Vulnerability”.
There is a term exploitable vulnerability means at least one attack for which security breakdown exists.
To secure a system or network it is important to understand the attacks that can be used against vulnerability. There is a list of some threats :

* Direct access Attacks

If a user gains physical access to a computer, then they can copy data from the system. Even they may break security by installing software worms, keyloggers or by modifying the operating system.

* Backdoor

This is the secret method of passing an authentication or security system.
Backdoor can be very hard to detect if you don’t have advance knowledge of operating systems.

* Denial-of-service attack
* Eavesdropping
* Phishing

This is an attempt to access users details such as username, password and card details
by deceiving users.

* Social engineering
* Spoofing

This is the process of gaining information or data from the user or anyone.
Some types of spoofing :

  1. Biometric spoofing
  2. Email address spoofing
  3. MAC spoofing
  4. IP address spoofing
* Privilege escalation
* Tampering

This is a negative modification of data or some changes in the same data.
Let’s discuss some of their impacts:

It is very hard to estimate the cost of an incident because there is no data available or that is not made public by organizations.
But one thing is very clear that security breaches have caused very serious economical and financial damage.
This is the reason why organizations are investigating in cybersecurity.

Systems at Risk

Increase in the computer system and dependency of various sectors on this has increased systems at risk. Some of these services are:

  • Aviation
  • Financial systems
  • Large Industries
  • Consumer devices
  • Automobiles
  • Government
  • Medical system
  • Utilities and industrial equipment
  • Energy services

Some notable list of data breaches

  1. Robert Morris and the first computer worm
    This incident takes place on 2nd November 1988.
  2. Rome Laboratory (1994)
  3. TJX customer credit card details (2007)
  4. Stuxnet attack (2010)
  5. Global surveillance disclosures (2013)
  6. Target and Home Depot breach (2013)
  7. Office of Personnel Management data breach (April 2015)
  8. Ashley Madison breach ( June 2015)
  9. Comelec breach ( March 2016)
  10. Yahoo (September 2016)

Computer Protection

There are some ways to prevent or minimize
threat, vulnerability and attack.

  • Secure by design
  • Security measures
  • Vulnerability management
  • Hardware protection mechanisms
  • Security architecture
  • Secure coding
  • Digital hygiene
  • Response to breaches
  • End-user security training
  • access control lists
  • Secure operating systems

Cybersecurity or information technology security Jobs and salary

The increasing popularity of this field has also increased career opportunities for students or professionals. Some of its job titles are below :

  1. Security analyst
    average salary ($88,043 per year).
  2. Security architect
    average salary ($123,448 per year ).
  3. Security engineer ($108,151 per year)
  4. Security administrator ($81,346 per year)
  5. Chief Information Security Officer (CISO) ($105,000 per year)
  6. Chief Security Officer (CSO) ($131,314 per year)
  7. Security Consultant ($79,725 per year)…etc
    Some free course program is also available in some countries for students.

2 thoughts on “Information Technology Security”

  1. Pingback: Artificial Intelligence (AI) | Humans future or future human

Leave a Comment

%d bloggers like this: