Preview

What kind of threats are there from using information technology and how can they be prevented?

Good Essays
Open Document
Open Document
1528 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
What kind of threats are there from using information technology and how can they be prevented?
As the name suggests, information technology has built on existing ways of storing information for various reasons including better security, accessibility and data integrity. Although there are various other reasons for using information technology, these are the reasons of primary importance and hence are necessary for the discussion of threats and prevention through various means.

Security is by far the most common reason for using information technology. Originally, important paperwork and confidential documents were stored in locked file cabinets so that even if someone did gain access to the room where the files were contained, their access would be limited to a lock. Thieves that wanted to retrieve the information would need to break or bypass the lock to retrieve the information.

In information technology, a computer is used in place of a filing cabinet (although there are still a number of firms that rely on old technologies or combinations of the two). Like the filing cabinet, the computer is only able to give access to those who have a "key" or password. A computer can also have a secondary security system in which different users have different access limits. This is equivalent to only having certain people in the office having access to different information. Furthermore, files in the computer can be locked by a particular user which is equivalent to locking a file in a filing cabinet which delays or prevents theft.

At this point we discuss why a computerized information system is either more or less secure than traditional methods. One of the primary ideas behind computers is that the computer key or password is unique for each person or group and can be changed as often as necessary with no cost other than time. Changing a real lock, however, is difficult because all of the keys for that lock must be changed which requires more time and of course money which is not as effective for running a business.

If a user loses a real key for a real lock,

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 1 Assignment 1

    • 1252 Words
    • 6 Pages

    Companies use information as a weapon in the battle to increase productivity, deliver quality products and services, maintain customer loyalty, and make sound decisions. Information technology can mean the difference between success and failure…

    • 1252 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Information security is the protection of information against accidental or malicious disclosure, modification or destruction. Information is an important, valuable asset of IDI which must be managed with care. All information has a value to IDI. However, not all of this information has an equal value or requires the same level of protection. Access controls are put in place to protect information by controlling who has the rights to use different information resources and by guarding against unauthorised use. Formal procedures must control how access to information is granted and how such access is changed. This policy also mandates a standard for the creation of strong passwords, their protection and frequency of change.…

    • 1356 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    The different information systems are filing cabinets where hard copies are stores or electronically which can be saved changes can be made and they can be made safe with a password.…

    • 802 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    In the first chapter of Outliers: The Matthew Effect, author Malcolm Gladwell introduces research done in showing that society has a unique way in perceiving success. He provides evidence of an uncontrollable source such as birthdates being a large factor in success by presenting the reader with charts. The author also tells of how children perceived as successful at a young age will continue to get ahead during life. The overabundance of proof shown in the text shows that the author has done an immense amount of research on this topic. Author Malcolm Gladwell effectively builds his argument of the connection of success to uncontrollable factors by appealing to the reader’s emotions, giving proof of research done by professionals, and giving…

    • 1404 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Cyber security must be an aggressive and evolving practice. Not only is it important to put security in place for current technology that can access electronic information, but also to look forward to future trends and strategies. Methods must also be developed that will continuously protect information regardless of growth and technological advances. As trends change and new technology develops it is the responsibility of businesses to balance cost saving measures with adequate security measures.…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    2.1 Information storage systems could include a locked filing cabinet. An electronic safe. A computer with file restricted access.…

    • 244 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    By implementing the information security characteristic would also be productive and non-cost efficient. In each scenario the attacker’s goal was not proposed for financial gain, but due to a political or personal dispute. So, by establishing a security system to defend critical data, such as alarm codes, safe blends, and other important documentation would not have been affective in any of the giving situations.…

    • 1047 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The benefits of using information technology for doing work tasks are crucial in any business. IT makes your business much easier. You can communicate much faster through Emails and faxes.…

    • 933 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    unit 221

    • 481 Words
    • 2 Pages

    The computer can be used for many different things. There are many different purposes for a computer, they can vary from producing documents, sending information to the printer, browsing the internet and managing applications. At work, one of the main reasons we use a computer every day is that we can monitor the security surveillance through the PC and we can see who enters and leaves the building with a magnetic key which must be scanned to use the doors to the building.…

    • 481 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Scope: Access control is the process of determining which users are allowed to perform what operations on which objects in a computer system. Healthcare information systems contain sensitive information about patients that is vital in the treatment process. Procedure:…

    • 458 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Computer – The computer can be used for many different things. There are many different purposes for a computer, they can vary from producing documents, sending information to the printer, browsing the internet and managing applications. At work, one of the main reasons we use a computer every day is that we can monitor the security surveillance through the PC and we can see who enters and leaves the building with a magnetic key which must be scanned to use the doors to the building.…

    • 1681 Words
    • 7 Pages
    Satisfactory Essays