$29.95 Buy and instantly download this paper now
This paper presents an overview of vulnerabilities and threats to information technology systems. First, the paper discusses several information security and Internet security reports that show there has been a marked increased in threats to security of the Internet and information technology. Then, it highlights how groups target information systems with viruses and other threats. Additionally, the paper notes companies have shifter their view of security risks to their systems. Various reasons are presented, particularly as they relate to the global financial crisis. Other types of security breaches are also cited. The paper concludes by stating that the nformation security posture all over the world is still proactive.
From the Paper:"Cisco Systems is one of the major suppliers of networking equipment and network management systems. They have evolved from providing the basic routers, switches and hubs to deployment of total network security systems that protects from the physical to the application layers of an enterprise's information system. They also provide businesses and industry with quarterly and biennial security report that shows latest trends in threats to information and Internet security. In their latest report, the glaring observation of the company as reported by Tom Gillis, Vice President and General Manager of Cisco Security Products, was: "We see many signs that criminals are mimicking the practices embraced by successful, legitimate businesses to reap revenue and grow their enterprises..."(Cisco Systems, 2009).
"The above statement is unfortunately true because nefarious groups and individuals have grown sophisticated with their cybercriminal activities. For example, domain names are easy to acquire and development of Websites are also fairly easy. All they have to do is buy a legitimate-looking domain name (i.e. www.finacialadvisor.com.au) and create a professional-looking Website. From this platform, they can send spam mails with botnets as payload in the attachments or even entice some unknowing individuals to subscribe to their services."
Sample of Sources Used:
- Cisco Systems (2009) Cisco 2009 midyear security report [Internet], San Jose, CA. Available from: <http://cisco.com/web/about/security/intelligence/midyear_security_review09.pdf> [Accessed 24 October 2009].
- Ernst & Young (2008) Ernst & Young global information security survey 2008 [Internet], London, UK. Available from: <http://www.ey.com/Publication/vwLUAssets/TSRS_Global_Information_Security_Survey_2008/$file/TSRS_Global_Information_Security_Survey_2008.pdf> [Accessed 24 October 2009].
- PriceWaterhouseCoopers LLP (2009) Global state of information security 2010 [Internet], Available from: <http://www.ukmediacentre.pwc.com/imagelibrary/downloadMedia.asp?MediaDetailsID=1557> [Accessed 24 October 2009].
- Richards, K. (2009) The Australian business assessment of computer user security: A national survey. Research and public policy series no. 102 [Internet], Canberra: Australian Institute of Criminology. Available from: <http://www.aic.gov.au/documents/3/B/3/%7B3B3117DE-635A-4A0D-B1D3-FB1005D53832%7Drpp102.pdf> [Accessed 24 October 2009].
- Richardson, R. (2008) 2008 CSI computer crime & security survey [Internet], San Francisco, CA: Computer Security Institute. Available from: <http://i.cmpnet.com/v2.gocsi.com/pdf/CSIsurvey2008.pdf> [Accessed 24 October 2009].
Cite this Term Paper:
Information Technology and Security Threats (2012, May 31) Retrieved May 24, 2013, from http://www.academon.com/term-paper/information-technology-and-security-threats-151305/
"Information Technology and Security Threats" 31 May 2012. Web. 24 May. 2013. <http://www.academon.com/term-paper/information-technology-and-security-threats-151305/>