System Security
People have been fond of the computer system since the late 1950,s and there have been a lot of changes in the computer systems till then. Late then the computer used to be in big size and small in function, also the system lacked serious security issue. Although the size of the machines used to big in size the function that the computer had were very poor. This was one of the major problem as it took lot of space to keep the system. With time the computer evolved as the knowledge of the system evolved (Peltier 2016). Now the computer systems that we possess are lot smaller and can do huge works. In terms of the security, the computer systems are some of the most secured systems in the world. Information security have become one of the most important thing that is been done in the modern systems. The term information security denotes that a system must be secured from any the authorised entry especially from the electronic devices. Strict measures has to be taken in order to protect the information and many of the systems are made especially for the purpose of protection of data.
Keeping a system secured is one of the most important thing is to be in the in today’s world. There are a number of threats that have been attacking the computer systems (Siponen, Mahmood & Pahnila, 2014). There have been number of cases where it has been seen that a computer system which is full of secured information is hacked by many of the hackers and data have been stolen form the machines.
Many of the scientists like the Tuna, (2017) states the information security can be sub divided in three subparts namely
- Confidentiality- Confidentially mentions that the data must be protected from unauthorised user accesses. Ensuring proper confidentiality ensures that information are safe and secured form the outside world.
- Integrity: Data integrity can be explained as the process to ensure that data is safe enough from being modified by unauthorised users (Soomro, Shah & Ahmed, 2016). This in order to make data secure one has to ensure data is properly integrity.
- Availability: Availability can be explained as the step where the right user must have the access to use the right information at the right time. Making sure this step is one of the major process and needs to be properly implemented.
According to Gan, et al (2014) there are a number of viruses and malware attacks attempts made to many of the systems. Some of the major malwares that attacks the computer systems area:
- DDOS attack: The DDOS attack or the Distributed Denial Of service attack is one of the most common attack these days. The main form of this attack is in the servers and networking sources (Lee et al., 2017). The form of the attack is it floods the system with huge number of incoming messages or connections requests in form of the malware packets which targets the system forces to slow down and even crash at times denies the verified user to use the system. According to Pathan, (2016) this is one of the major problem these days and is a huge threat to the information security.
- Malware: The malwares is a kind of malicious software that hackers use for different purposes. The software does processes like the stealing of user data, blocking of systems, injecting files that corrupts the computer systems, encrypting the computer system. Other than this the malwares also injects files that duplicates itself and fills up the memory of the computer systems (PITCH et al., 2015). This is one of the most common form of virus.
- Spyware: A spyware is a form of malware that helps the hackers to keep an eye on the victim computer system. This is one of the most dangerous form of virus which can affect a computer system. These bots steals information related to banks like the card details, account details, social media details among others.
- Viruses: The viruses are similar to the malwares and does things same to the malwares (Papp, Ma, & Buttyan, 2015). The most common form of virus is a Trojan horse which specialises in replicating itself in the victim computer system. Thus making one of the major problem for the users of the system.
- SQL injection Attacks: The Sql Injection can be explained as a security exploit which helps the attacker to change the details of the databases through the standard quarry languages. The hacker enables codes with the help of the browsers by making the changes in the HTML codes of the web pages. This is one of the major problems as many a times it have been seen that the amount of the data is increased though redundancy by hackers making huge problems for the database managers.
- Ransome ware Attacks: These are the most dangerous malware attacks that are ever made by the hackers. Under this system hackers use high end encryption system to encrypt the victims’ computer system and in exchange of the providing the key to decrypting the system asks for huge sum of money in exchange. There have been a numerous number of this type of attacks. One of the most affected was the attack was made by the wannacry malware.
Information security is one of the most important thing that have be done by any user for the safekeeping of data. If proper steps to prevent attacks are not made then there are chances of huge data threats (Shameli-Sendi, Aghababaei-Barzegar & Cheriet, 2016). In organisational level serious steps must be taken in order to protect data form hackers and crackers in order to make thee working procedure safe and secure. Some of the basic steps for the process of preventing of data are:
- Creating Strong Passwords: One must create strong passwords for preventing hackers stealing data and protecting information.
- Installing firewalls: Installing firewalls is like putting a security guard in the network system. Enabling the firewall clan help the system to detect things that are unusual and enhance the computer security.
- Antivirus: An antivirus system is a software that is specially made for the purpose of ensuring proper security to the systems. The work of this systems is to ensure that it detects any disables any possible threat to made by any hacker. In the modern times these type of software have become very much powerful and hackers are trying hard to disable this type of securities.
- Using Original and Authenticated software: It is often seen that people use pirated software which opens up pathways for hackers to access data. One of the major fault is using pirated Windows, this is one of the most dangerous mistake that is made by many of the users which the hackers use as opportunity.
- Using strong Authentication systems: Using a secured authentication and encryption for the computer systems can help reduce the attack chances in a system. In organisation state it has be done in a very proper manner as security is one of the most important thing that has to be done.
Layton, (2016) says that in the coming future it can be said that a number of changes that will be coming will enhance the security systems of the computer systems that we own today. Some of the major changes that are being developed are the Iris Scanners, the retina Scanner which can changes the world on computer logical security. Other than this the introduction of the Artificial Intelligence and the Machine Learning Technologies can also boost up the changes in the world of the computer systems. This system can help in the proper patching of the systems with the modern technologies and hence can boost up the security services of the systems. Other than this developing a common language for all the programing concepts can help in reducing the hacking chances.
Conclusion:
Thus concluding the topic, it can be said Information security is one of the most important thing that is to be considered. If there is no any proper information security system in the computer systems, servers it can cost a lot to the individual. Proper steps must be taken in order to enhance the security of the systems so that there is no loss. There is a need where to follow the steps of the confidentiality, integrity and availability of the subject devices and data are some of the most. It is to be ensure that original software is used for the proper security of the system device. It has be ensured in the future the technologies that are been developed must be used in a proper way so that the amount of the data loss to the hackers are reduced. It can be said that what kind of attacks can come in future.
References:
Gan, C., Yang, X., Liu, W., Zhu, Q., Jin, J., & He, L. (2014). Propagation of computer virus both across the Internet and external computers: A complex-network approach. Communications in Nonlinear Science and Numerical Simulation, 19(8), 2785-2792.
Layton, T. P. (2016). Information Security: Design, implementation, measurement, and compliance. Auerbach Publications.
Lee, J., Yoo, B., Lee, H., Cha, G. D., Lee, H. S., Cho, Y. … & Kang, M. (2017). Ultra?wideband multi?Dye?sensitized upconverting nanoparticles for information security application. Advanced Materials, 29(1), 1603169.
Papp, D., Ma, Z., & Buttyan, L. (2015, July). Embedded systems security: Threats, vulnerabilities, and attack taxonomy. In Privacy, Security and Trust (PST), 2015 13th Annual Conference on (pp. 145-152). IEEE.
Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Auerbach Publications.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Auerbach Publications.
PITCH, M. A., UBIQUITY, C. T., AN, B., YAFEE, P., STUCKEY, J., ANDERSEN, E., & SAHA, G. K. (2015). Information security.
Shameli-Sendi, A., Aghababaei-Barzegar, R., & Cheriet, M. (2016). Taxonomy of information security risk assessment (ISRA). Computers & security, 57, 14-30.
Siponen, M., Mahmood, M. A., & Pahnila, S. (2014). Employees’ adherence to information security policies: An exploratory field study. Information & management, 51(2), 217-224.
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), 215-225.
Tuna, G., Kogias, D. G., Gungor, V. C., Gezer, C., Ta?k?n, E., & Ayday, E. (2017). A survey on information security threats and solutions for Machine to Machine (M2M) communications. Journal of Parallel and Distributed Computing, 109, 142-154.