Provide a 7 pages analysis while answering the following question: Information Technology Security. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is required. This is especially with regard to the increasing methodologies that can be employed by crackers to attack the information system of an organization.
Different attack methodologies can be employed by a cracker to attack an organization whose information technology is not secure. There are four broad methodologies that can be used and these forms the four common offenses as regards attacks on the systems of information of an organization. These are computer-related attacks, data-related attacks, network-related attacks, and access-related attacks. All these four types of attacks have significant negative effects on the objectives of that particular organization in possession of the information system.
These would be broadly categorized as industrial espionage and software piracy including other forms of infringement on copyright (Gelbsten & Kamal, 2002). The industrial espionage has been enhanced by the establishment of a worldwide network such as the internet. This has made it possible for professional crackers to obtain and destroy information of organizations. The crackers can equally be able to use the internet to have access to the salaries that the staff of an organization is paid. Through the internet, hackers can equally steal the commercial strategies of an organization. These strategies can be sold to the competitors of the said organization so as to enhance their strategies and outdo those ones. Under software piracy and the infringement of copyright, the attacker will develop a copy of the software used by a company and then distribute it to other people. This type of piracy emerged in the early 1990s especially with the development of personal computers and laptops. This type of piracy also occurs in many countries worldwide. The types of software which can be pirated in a company include packages for financial accounting. computer-aided design and toolboxes .as well as workshops for digital photography among others (Pesante, 2008). .
Show more
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more