Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Data and Information Security Issues, Essay Example
Hire a Writer for Custom Essay
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Introduction
Information technology security is whereby access to sensitive information of an organization is controlled. Organizations all over the world have embraced information technology security as the use of IT grows in different parts of the world. IT security has however become a major challenge and concern as firm strive to maintain secrecy in their transactions, integrity and making information available when required (Oliva, 2004). Today, organizations are faced with the challenge of hackers and naïve users of information technology. Use of company’s laptop at home by employees for individual gain exposes the system to all manner of malware especially when using common browsers whose security details have not been upgraded. Companies should therefore restrict the use of the corporation’s laptop at home and for personal interest (Whitman & Mattord, 2012). Organizations have also invested heavily in the latest software and upgrade on their systems to stay ahead of potential hackers and web attacks.
Information technology breach is a sensitive issue, and whenever such a breach occurs the following approach should be implemented:
Change password
The forensic investigator should ensure that he changes the password before anything else. This is only possible if the hackers failed to change the password (Oliva, 2004). The password should be stronger and least predictable.
Report the bug to the service provider
The investigator should report this incident to the service provider who could advice on security measures to taken as well as identify the source of the attack and the extent of damage caused.
Notify your contacts
The account holder should inform all his contacts about the incident and ask them to ignore any information they received between certain periods (Slay & Koronios, 2006).
Do a computer scan
Using an up to date antivirus, the forensic investigator should scan for any viruses or malware left behind by the wizards and permanently eliminate them from the system.
Change personal settings
The investigator should review his personal settings and change the most predictable ones. He should ensure that a secret address has not been created that can be used to forward his information.
Change security details of other sites
If the account shares password or details with some other account, these details should be changed to reduce the vulnerability of more attacks (Khadraoui & Herrmann, 2007).
However, when the attack is still ongoing, the forensic specialist should:
- Conduct a risk assessment procedure
- Install a capture device
- Activate the collection script
- If completed, remove the device
- Verification of data and power off procedure
The forensic investigator is also expected to take due diligence when investigating the information technology crime. Some of the steps he/she should take for a comprehensive investigation include:
- The forensic specialist should first obtain a permit to search the premises where the crime is suspected to have occurred
- The forensic specialist should ensure that the crime scene is well guarded so that the evidence available is not interfered with (Whitman & Mattord, 2012). This also ensures nothing malicious is brought in the crime scene.
- The specialist should ensure all items seized from the crime scene are well documented in order to account for all items picked from the crime scene.
- Packaging and tagging of the seized equipment then transporting them to the forensic
- Use of sophisticated forensic instruments and tools to extract e-evidence that is used to develop a forensic image.
- The forensic specialist then interprets the information obtained, and comes up with references based on them.
- Presentation of the evidence obtained in a way that is understandable by an ordinary person, and that can be easily read.
However, during the gathering of forensic information, the forensic specialist gathers data in order, which is the order of data loss. The order of volatility includes:
- File system information
- Network processes
- Memory contents
- Swap files
- System processes
- Raw disk blocks
A Technique that can be used in the extraction of volatile data is by saving the random access memory in a compact disk (Khadraoui & Herrmann, 2007). Numerous system files have special features like NTFS and ReiserFS that store a large quantity of the RAM data and these files can be re-integrated to restore the information that was in the RAM.
In the analysis and collection of the highly volatile data, the following should be considered:
- A photograph of the scene should be taken together with the computer.
- The screen should be photographed if the computer is powered.
- All cords should be labeled.
- All steps should be documented.
- Only live data should be collected.
However use of improper documentation and improper tools may render the evidence admissible (Whitman & Mattord, 2012). Improper use of the correct tools and leaving behind acquisition footprints can render the evidence useless.
Conclusion
Information technology security has become a major challenge in the business world. Organizations are trying to find a balance between the need to use information and security of the information. Companies are also investing in the latest software to prevent the frequent web attacks and hacking which have become the order of the day in the modern society.
References
Khadraoui, D., & Herrmann, F. (2007). Advances in enterprise information technology security. Hershey [Pa.: Information Science Reference.
Oliva, L. M. (2004). IT security: Advice from experts. Hershey [Pa.: CyberTech Pub.
Slay, J., & Koronios, A. (2006). Information technology security and risk management. Milton, QLD: Wiley.
Whitman, M. E., & Mattord H. J. (2012). Principles of information security. Boston, MA: Course Technology.
Stuck with your Essay?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee