1,853
12
Essay, 4 pages (850 words)

Overview of security issues in it essay

The issue of security is a very important matter to individuals and organizations who and that have set up computer systems or networks for particular and beneficial reasons or purposes. Apparently, for IT and other types of network systems, not only virtual but also physical security is significant to ensure that data and information are well-guarded for the individual or organization’s benefit. Boran, 1999) For this reason, individuals and most especially organizations are focused on implementing various security measures in order to prevent security breaches or to lessen their effects or impacts to the IT or network system once they happen.

For instance, organizations would resort to prevention measures, deterrence or admonition. These three processes contribute to IT or network system security because of their unique purposes – prevention constitutes the implementation of various security measures that will make it difficult for external parties to breach the system, deterrence refers to masking the value and vulnerability of the system by transforming its external structure to become insignificant and unattractive, and admonition pertains to warnings or cautions presented to individuals working for the organization in order for them to avoid committing actions that might jeopardize the security of the IT or network system. Miller, N. D. ) The remainder of this text will be billed to present information about admonition, looking into its definition and purpose. In addition, its significance and efficiency in resolving security issues will also be analyzed. Although admonition works better if coupled with deterrence (Miller, N. D.

), admonition alone contributes to the security of IT and network systems. A simple example of admonition is the presence of pop-up signs or windows that display warnings to IT or network system users prior to their issuance or implementation of commands or protocols. For instance Microsoft Windows applications formulated by Bill Gates are designed with the technology of providing warning or cautionary advices to end users that will tell them the dangers or risks of going through various commands or protocols within the computer system or network. Pop-up boxes or windows contain a variety of information that allow end users to be guided on how to handle risky situations, such as the presentation of various choices that the end user might opt to take in order to prevent breaches and violations to security and security measures. Seifert, Welch, & Komisarczuk, 2006) The usefulness of admonition is evident on how it may be used as a means of preventing the possible threats and risks that come with breaches and violations to IT or network systems and security measures. In addition, IT security strategies should not only focus on the common or obvious problems related to breaches or violations, but also focus on how information within the IT system is restricted or controlled in order to prevent the occurrence of undesirable IT transfers, storage, interpretations, etc.

hat will pose threats and risks to the organization. This is supported by a factual example that looks into the need for admonition systems whenever information is supposed to be shared. For instance, confidential files sent through the IT network or systems are supposed to be kept private by the recipients. Part of admonition IT security strategies are to inform people whenever there are actions, commands, or protocols being made that might leak the confidential information to third parties. Another admonition IT security strategy is to communicate it directly to the recipient as in one-on-one conversations. (“ Admonition Systems,” 2008) The results or outcomes of admonition is to establish influence and authority over individuals within the organization in order for them to limit or control the sharing or transfer of information whenever it is labeled restricted or confidential. With this in mind, admonition fits the overall security strategy needed by organizations by focusing on two specific parts of the system – the virtual and physical security dimensions of the IT network or system. In addition, if other strategies are present to prevent the onset of IT security breaches or violations and to alter the physical or external dimensions of the IT network or system in order to deceive external parties, admonition focuses on other aspects of IT security strategies.

It completes what other security strategies lack, or rather provides what is missing through its unique and efficient features. The virtual security strategy of admonition is designed within the system already making it possible to monitor the prompts, commands, or protocols being utilized and then limit or control the use of information within the system in order to prevent breaches and violations to IT system security. It guides individuals on how to handle sensitive or private information and data by informing them of the results and outcomes if particular commands will be implemented to release or publish information. (Seifert, Welch, & Komisarczuk, 2006)On the other hand, the physical design of the IT security system is also protected since admonition establishes the affirmation of laws and policies that are important for members of the organization to remember when handling the IT system or network. Whenever individuals remind other people within the organization to secure information, IT security laws and policies embodied within the IT security strategies are firmly or strictly implemented, while at the same time, the results and outcomes of the implementation process is monitored or supervised in order to ensure that individuals are abiding by IT security rules and laws.

Thank's for Your Vote!
Overview of security issues in it essay. Page 1
Overview of security issues in it essay. Page 2
Overview of security issues in it essay. Page 3
Overview of security issues in it essay. Page 4
Overview of security issues in it essay. Page 5

This work, titled "Overview of security issues in it essay" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Overview of security issues in it essay'. 14 September.

Reference

AssignBuster. (2022, September 14). Overview of security issues in it essay. Retrieved from https://assignbuster.com/overview-of-security-issues-in-it-essay/

References

AssignBuster. 2022. "Overview of security issues in it essay." September 14, 2022. https://assignbuster.com/overview-of-security-issues-in-it-essay/.

1. AssignBuster. "Overview of security issues in it essay." September 14, 2022. https://assignbuster.com/overview-of-security-issues-in-it-essay/.


Bibliography


AssignBuster. "Overview of security issues in it essay." September 14, 2022. https://assignbuster.com/overview-of-security-issues-in-it-essay/.

Work Cited

"Overview of security issues in it essay." AssignBuster, 14 Sept. 2022, assignbuster.com/overview-of-security-issues-in-it-essay/.

Get in Touch

Please, let us know if you have any ideas on improving Overview of security issues in it essay, or our service. We will be happy to hear what you think: [email protected]