Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Provide a 7 pages analysis while answering the following question: Information Technology Security. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is req

Provide a 7 pages analysis while answering the following question: Information Technology Security. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is required. This is especially with regard to the increasing methodologies that can be employed by crackers to attack the information system of an organization.

Different attack methodologies can be employed by a cracker to attack an organization whose information technology is not secure. There are four broad methodologies that can be used and these forms the four common offenses as regards attacks on the systems of information of an organization. These are computer-related attacks, data-related attacks, network-related attacks, and access-related attacks. All these four types of attacks have significant negative effects on the objectives of that particular organization in possession of the information system.

These would be broadly categorized as industrial espionage and software piracy including other forms of infringement on copyright (Gelbsten & Kamal, 2002). The industrial espionage has been enhanced by the establishment of a worldwide network such as the internet. This has made it possible for professional crackers to obtain and destroy information of organizations. The crackers can equally be able to use the internet to have access to the salaries that the staff of an organization is paid. Through the internet, hackers can equally steal the commercial strategies of an organization. These strategies can be sold to the competitors of the said organization so as to enhance their strategies and outdo those ones. Under software piracy and the infringement of copyright, the attacker will develop a copy of the software used by a company and then distribute it to other people. This type of piracy emerged in the early 1990s especially with the development of personal computers and laptops. This type of piracy also occurs in many countries worldwide. The types of software which can be pirated in a company include packages for financial accounting. computer-aided design and toolboxes&nbsp.as well as workshops for digital photography among others (Pesante, 2008).&nbsp.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question