Discuss about the Infrastructures Autonomous Decentralized Systems.
According to Abomhara, 2015, the security to the information technology or IT and inter of things or IoT is somewhat similar in terms of cyber world. The security attacks, threats or vulnerabilities are extremely common for any business or organization. This is eventually because these are weaknesses that every equipment of information technology possesses. There are two types of systems in information technology. They are the system software and system hardware. Both of these components have in built flaws in them and thus should be mitigated at every aspect. The hardware vulnerabilities are mainly because of the problem in identification and fixing them in timely manner. The software vulnerabilities are found within the application software, control software and operating systems. The control software mainly includes communication protocols or device drives. Moreover, the design flaws are also present within the software and hence it becomes explicitly difficult for the software designer to implement the software in their business properly. The technical vulnerabilities are another form of this software flaw that happens for the weakness of the human beings. The privacy or security of the information technology thus should be maintained without any type of failure.
As per Eason, 2014, information technology is the proper utilization of systems and computers for various data operations like storing, retrieving, transmitting and manipulation. Any specific organization or company implements this information technology within their business for successfully executing the business operations and processes. The information technology is the subset of ICT or information and communication technology. The process of decision making is absolutely easier with the help of this information technology as the services and products of the technology like hardware, e commerce, telecom equipments, software and many more. This information technology is substantially utilized within the context of all types of enterprise operations, which do not cross the effectiveness of other technologies. The IT is responsible for the overall changes or alterations within the organization that has incorporated it and hence is extremely important for the business. Moreover, this information technology is maintained with high security and privacy for keeping all the data or information absolutely safe and secured. The IT security is maintained with the help of several cyber security forms and technologies.
Bloom et al., 2014, in their article stated that information and communication technologies or ICT usually differentiate the components of information as well as communication together. The information technology has various types of effects on the various decisions that are being taken for the betterment of the business in each and every management level. The most effective access of information pushes these decisions to upwards and hence the organization or company is benefitted. The privacy of the information technology is solely maintained by the help of various cyber securities like antivirus, malware protection, firewall and many more. All these cyber securities help the organization in securing and protecting their IT equipments, IT assets, confidential and sensitive information or data. The organizational members are responsible for securing the data or information properly and they should protect their own sphere and own assets or equipments. Various cases have been registered that demonstrate the uncertainty of the security of personal information. The advancement in the information technology has lead to the threatening situations for any organization. The probability of the negative consequences is extremely high in this type of technologies.
Schwalbe, 2015, in his book has stated about the entire concept of information technology within any typical project or project management of the company. All the organizations require implementing the information technology within their businesses and project for obtaining all the advantages from it. The most significant advantages that the business obtains from project management mainly include easy management of the projects without any type of problem and easy collaboration of all the processes of the business. This particular technology even integrates the business processes and the process of execution extremely easy. The success of the project solely depends on the factors of the information technology and thus should be maintained and protected properly. There are some of the tools and techniques that help the project in improving the implementation of the project within the business. The security is the most significant factor for the information technology.
Wang and Lu, 2013, in their journal has stated about the cyber security in the next generation information technology. This eventually refers to the Smart Grid or next generation power system. The complete integration of communication technologies and advanced computing is supposed to enhance the reliability as well as efficiency of systems with the demand responses and distributed intelligence. This cyber security substantially emerges to the most critical issue as millions of information technology devices are connected through communication networks. There is a strong impact of reliability on the cyber security. The requirements of security, attack counter measures, protocols for secured communication, various network threats and vulnerabilities are checked and mitigated with the help of this type of security.
According to Lloyd, 2017, there are various rules and regulations for the implementation of information technology within any specific organization or company. These rules or regulations help to understand the basic requirement or importance of information technology in the business. This information technology has various restrictions or limitations within their business and thus all the limitations should be properly checked. If any type of discrepancy is noticed within the technology, the organization can take legal actions for this. Hence, all the laws should be followed for implementing the information technology. Furthermore, this new version of information technology is utilized for governing the digital dissemination of the information as well as software. There are various issues or problems in the intellectual property for computing or online, privacy, jurisdiction and freedom for expression. This law of information technology is often violated by various organizations and thus legal steps are taken for them. The privacy and security of information technology is solely observed by the organization and the moment any problem is noticed, necessary actions are taken by them.
According to Jouini, Rabai & Aissa, 2014, there is a basic classification of the security threats or risks within the information systems. This type of system is often exposed to the various kinds of risks, which are vulnerable and can cause damages to the information technology equipments. The impact of this destruction can even lead to financial losses and thus this should be checked. There are different criteria for threats and vulnerabilities in any information system this classification is done on the basis of a classification model. The privacy of IT is often maintained with the help of this classification model.
As per Holtshouse, 2013, information technology is important or vital for the management of knowledge. This knowledge management has become effective for the survival of the business for the incrementing reliance on knowledge work. IT or information technology plays the significant role for enabling knowledge management. The most significant objective of this information technology is to control or manage the organizational changes or alterations. Information technology helps to do this phenomenon perfectly and efficiently. The hierarchy for data, information as well as knowledge in any business should comprise of the perfect infrastructure of information technology. Moreover, the information technology is utilized for streamlining the communication within the business. Efficient communication and strategic thinking are enhanced with the help of information technology.
As per Von Solms and Van Niekerk, 2013, cyber security can be defined as the type of information security that provides protection beyond the boundary of traditional or usual security to information. The cyber security is the security to the computer systems from any kind of damage or destruction to the software, hardware and information. Moreover, the disruption to the services or rather the misdirection to the services that information technology is providing to the users is eventually checked and reduced with the help of cyber security. The overall control of the physical access to hardware is done with the help of cyber security. Hence, the privacy of the IT equipments is maintained with this. The security or privacy of this information technology is also effective for the malpractices or intentional and accidental threats to the equipments. Various computer systems like laptops, computers, smart phones and devices for Internet of Things are secured with the help of cyber security. These computer systems are collectively known as information technology. The data or the information that is stored within these devices is protected with the help of information security.
As per Sommestad, Ekstedt and Holm, 2013, there is a specific model that helps in the privacy and security of the information technology or equipments and software of information technology. This particular tool is known as Cyber Security Modeling Language or CySeMoL. It is a typical modelling language, which helps the enterprise level system architectures to be absolutely safe and secured. If any specific computer system of the company is modelled with the tool of Cyber Security Modeling Language, the inference engine eventually assesses the possibility of the attacks on the system. There are several issues or problems that are related to IT or information technology. All the computer systems in any enterprise have the vulnerabilities within them. Security thus is the most complex problem for these systems. With the help of this tool for security, Cyber Security Modeling Language, the chances of such vulnerabilities are reduced significantly. The utility of this tool of CySeMoL is examined in various case studies.
Razzaq et al., 2013, stated that cyber security is the most significant requirement in any organization. The information sharing as well as the professional activities such as advertisements, services, banking transactions and many more are tracked with the help of the cyber security. The exponential increment of the usability of the cyber space and cyber criminal activities is simply because of the high level advancement of information technology. In today’s world, the high technology should be maintained eventually and thus the industrial applications are getting more and more complicated. The various cyber threats or risks could be reduced with this cyber security.
As per Luiijf, Besseling and De Graaf, 2013, there are various strategies for cyber security for any information technology. A collection of several nations or countries have eventually published their NCSS or national cyber security strategies for addressing all the threats and risks related to information system. Appropriate or suitable organizational strategies are required for executing the business processes and hence it is important to implement such a technology that is useful for them in making the organizational strategies. The strategy for knowledge management should be explicitly congruent with all the competitive strategies of that business.
References
Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65-88. Retrieved from https://www.riverpublishers.com/journal_read_html_article.php?j=JCSM/4/1/4
Bloom, N., Garicano, L., Sadun, R., & Van Reenen, J. (2014). The distinct effects of information technology and communication technology on firm organization. Management Science, 60(12), 2859-2885. Retrieved from https://dash.harvard.edu/bitstream/handle/1/17417216/bloom%2Cgaricano%2Csadun%2Cet-al_the-distinct-effects-of-it%20and%20communication.pdf?sequence=1
Eason, K. D. (2014). Information technology and organisational change. CRC Press. Retrieved from https://content.taylorfrancis.com/books/download?dac=C2004-0-19011-5&isbn=9781482275469&format=googlePreviewPdf
Holtshouse, D. K. (2013). Information technology for knowledge management. Springer Science & Business Media. Retrieved from https://books.google.co.in/books?hl=en&lr=&id=xpm-BwAAQBAJ&oi=fnd&pg=PR5&dq=information+technology&ots=s8agSUVI1R&sig=TZzDfHio1m16-iKB2Gwo9fuoiDM#v=onepage&q=information%20technology&f=false
Jouini, M., Rabai, L. B. A., & Aissa, A. B. (2014). Classification of security threats in information systems. Procedia Computer Science, 32, 489-496. Retrieved from https://ac.els-cdn.com/S1877050914006528/1-s2.0-S1877050914006528-main.pdf?_tid=3c2753ac-2d30-4cac-ab69-6aaf99dc8c51&acdnat=1524825982_a69f84aad22aa67bcf7967c47f556783
Lloyd, I. (2017). Information technology law. Oxford University Press. Retrieved from https://books.google.co.in/books?hl=en&lr=&id=Bt1KDgAAQBAJ&oi=fnd&pg=PP1&dq=information+technology&ots=CqrkdM0DpG&sig=eogxeLMWCqbEB1j7Lk2z27ldxQM#v=onepage&q=information%20technology&f=false
Luiijf, E., Besseling, K., & De Graaf, P. (2013). Nineteen national cyber security strategies. International Journal of Critical Infrastructures 6, 9(1-2), 3-31. Retrieved from https://s3.amazonaws.com/academia.edu.documents/45513910/Nineteen_National_Cyber_Security_Strateg20160510-9073-1x5azcb.pdf?AWSAccessKeyId=AKIAIWOWYYGZ2Y53UL3A&Expires=1524829780&Signature=e7AwkhMNgE7WcZVKfVTz3xLDOf4%3D&response-content-disposition=inline%3B%20filename%3DNineteen_national_cyber_security_strateg.pdf
Razzaq, A., Hur, A., Ahmad, H. F., & Masood, M. (2013, March). Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial applications. In Autonomous Decentralized Systems (ISADS), 2013 IEEE Eleventh International Symposium on (pp. 1-6). IEEE. Retrieved from https://s3.amazonaws.com/academia.edu.documents/40768110/Cyber_security_Threats__reasons__challenges__methodologies_and_state_of_the_art_solutions_for_industrial_applicat.pdf?AWSAccessKeyId=AKIAIWOWYYGZ2Y53UL3A&Expires=1524828408&Signature=OMvv997QaYVao1H6znrZ6ldmaKY%3D&response-content-disposition=inline%3B%20filename%3DCyber_Security_Threats_Reasons_Challenge.pdf
Schwalbe, K. (2015). Information technology project management. Cengage Learning. Retrieved from https://s3.amazonaws.com/academia.edu.documents/46169145/5e-ch-1.pdf?AWSAccessKeyId=AKIAIWOWYYGZ2Y53UL3A&Expires=1524818403&Signature=T3YNbT0CaYeNJROMT8ks5%2FqJsBo%3D&response-content-disposition=inline%3B%20filename%3DAn_Introduction_to_Project_Management_Fi.pdf
Sommestad, T., Ekstedt, M., & Holm, H. (2013). The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures. IEEE Systems Journal, 7(3), 363-373. Retrieved from https://www.diva-portal.org/smash/get/diva2:561243/FULLTEXT02
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102. Retrieved from https://ldc.usb.ve/~torrealba/sti-242/4ta_Clase/solms-2013.pdf
Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and challenges. Computer Networks, 57(5), 1344-1371. Retrieved from https://s3.amazonaws.com/academia.edu.documents/36811314/13wl-comnet.pdf?AWSAccessKeyId=AKIAIWOWYYGZ2Y53UL3A&Expires=1524825676&Signature=wi3n11rbEEs9VDWIZ1MIvoWEKn0%3D&response-content-disposition=inline%3B%20filename%3D13wl-comnet.pdf
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download