IT Infrastructure: Hardware and Software Assignment
annotated-Creech20Infrastructure20Software.docxSecuring Information Systems Discussion Question
Discuss how companies and organizations are securing their information systems. What tools are they using? What is the cost of securing information systems? What is the cost of not securing information systems? What are the most effective techniques of securing information systems? What are the least effective techniques of securing information systems?
Companies and organizations are developing tactics to strengthen their information systems against outside forces. With hackers becoming far more creative, measures need to be taken to protect valuable infrastructure. One way companies and organizations are securing their information systems is through multi-factor authentications, which is something that ordinary citizens already use. Multi-factor authentication is a great way to secure information systems because it requires additional action on part of the person trying to enter the system and it prevents bots from accessing it on their own. Often times, it needs detail of a person within the company itself such as biometrics. Encryption is another tool that companies have at their disposal which makes data harder to obtain. Preventing files from being read through encryption ensures that even if the data was taken, it would be unreadable by the attacker. Lastly, knowledge itself can be considered another effective tool often overlooked that can help secure information systems. Understanding the ins and outs of your system, how to effectively manage it, and training your fellow co-workers as well in the workplace can reduce risk of an attack ever happening in the first place.
Unfortunately, costs can often times be troubling when it comes to securing information systems. Companies often follow budgets, which often times securing information systems can be a financial problem for some. There are many different aspects of information systems that need to be considered before making changes such as all the parts of the information system that needs to be protected, what can be used to protect them, and how much overall will it cost. Ways these valuable parts of the information system can be protected would include firewalls or IDPS. Considering the costs first before implementing them would cause less trouble for a company, but it is also a “necessary evil” that they afford it anyways. Otherwise, they risk becoming a victim of a cyberattack.
Overall, the most effective techniques of security systems can include plenty of things. But, the most obvious ones would include multi-factor authentication and encryption. They are simple, yet effective preventions. Some companies are too reliant on techniques that are considered least effective, which is why they are more likely to be a victim of cyberattacks. These techniques would include being too reliant on passwords and outdated infrastructure, such as software and hardware.